Umuwa Home
  Web     Image     Video     News  
 
Showing results for api_home_dir=

    Web Results
 
 
modsecurity_crs_46_slr_et_lfi_attacks.conf - GitHub 
 
github.com
Dec 16, 2013 ... (2008878) SpiderLabs Research (SLR) Public Vulns: ET WEB_SPECIFIC_APPS Free Directory Script 1.1.1 API_HOME_DIR Local File ...    
 
 
Installation - C-Worker 
 
www.c-worker.ch/txtdbapi/manual_html_eng/installation/...
$API_HOME_DIR: This variable must be set to the absolute or relative path where all the Txt-Db-Api Files are located. For example: /home/c-worker.ch/public_html/php-api/ $DB_DIR:  
 
 
 
Here - RSnake 
 
ha.ckers.org
Feb 1, 2010 ... BSX_LIBDIR=XXpathXX /CSLH2_path/txt-db-api/util.php?API_HOME_DIR=XXpathXX? /CheckUpload.php?Language=XXpathXX&cmd=ls ...    
 
 
Free Directory Script 1.1.1 (API_HOME_DIR) RFI Vulnerability ... 
 
cxsecurity.com/issue/WLB-2009030067
Ghost Hacker has realised a new security note Free Directory Script 1.1.1 (API_HOME_DIR) RFI Vulnerability    
 
 
Web application abuses - Network Security Audits / Vulnerability ... 
 
www.securityspace.com
1.3.6.1.4.1.25623.1.0.900181, High, Free Directory Script 'API_HOME_DIR' File Inclusion Vulnerability. 1.3.6.1.4.1.25623.1.0.900150, Medium, HP System ...    
 
 
Free Directory Script "API_HOME_DIR" File Inclusion Vulnera ... 
 
forums.cnet.com/7726-6132_102-2910446.html
Spyware, viruses, & security: Free Directory Script "API_HOME_DIR" File Inclusion Vulnera - Read spyware, viruses, and security discussions and get tips and advice on this topic and others on CNET Forums.  
 
 
 
Overview of the Black Ocean 
 
www.spamvz.net
... Federale Overheidsdiensten" /txt-db-api/txt-db-api.php?API_HOME_DIR= "powered by Crafty Syntax Live Help 2.7" /dotproject//includes/db_connect.php?    
 
 
Web application abuses : Free Directory Script 'API_HOME_DIR ... 
 
www.securityspace.com/smysecure/catid.html?id=1.3.6.1.4...
Free Directory Script 'API_HOME_DIR' File Inclusion Vulnerability;Check for the vulnerable version of Free Directory Script  
 
 
 
Milw0rm Network Security Exploits - Emagined Security 
 
www.emagined.com
1339 Milw0rm Security Exploits, Published.    
 
 
Free Directory Script "API_HOME_DIR" File Inclusion ... 
 
www.f-secure.com/vulnerabilities/SA32745
A vulnerability in Free Directory Script, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the "API_HOME_DIR" parameter in init.php is not properly verified before being used to include files.  
 
 
 
Free Directory Script 1.1.1 (API_HOME_DIR) RFI Vulnerability 
 
www.exploit-db.com/exploits/7155
Free Directory Script 1.1.1 (API_HOME_DIR) RFI Vulnerability Free Directory Script 1.1.1 (API_HOME_DIR) RFI Vulnerability. EDB-ID: 7155: CVE: 2008-6305: OSVDB-ID: 49923: Author: Ghost Hacker: Published: 2008-11-18: Verified: Exploit Code:    
 
 
QASystemInfo - Contact Data Management Software and Services ... 
 
www.qas.com/us/support/manuals/pro/v6.40/QAS%20Pro%20API...
... \Program Files\QAS\QAS Pro API: Home Dir: C:\Program Files\QAS\QAS Pro API: Data Dir: C:\Program Files\QAS\QAS Pro API: Temp Dir: C:\Temp: Log File: <disabled> ...  
 
 
 
Installation - lions-bagagerumsmarked.dk 
 
www.lions-bagagerumsmarked.dk/pages/php-txt-db/manual/...
$API_HOME_DIR: This variable must be set to the absolute or relative path where all the Txt-Db-Api Files are located. For example: /home/c-worker.ch/public_html/php-api/ $DB_DIR:  
 
 
 
ISS X-Force Database: freedirectoryscript-init-file-include ... 
 
xforce.iss.net/xforce/xfdb/46699
Description: Free Directory Script could allow a remote attacker to include arbitrary files. A remote attacker could send a specially-crafted URL request to the init.php script using the API_HOME_DIR parameter to specify a malicious file from a remote system, which could allow the attacker to ...    
 
 
Ship Manager API - FedEx: Shipping, Logistics Management and ... 
 
www.fedex.com/us/solutions/wis/pdf/LabelExtensions...
FedEx will not be responsible for any claim in excess of $100 per package, whether the result of loss, damage, delay, non-delivery, ... \ API_HOME_DIR \LIB LBLEXTS.H \INCLUDE These folders can be found where you installed FedEx Ship Manager API. The Win32 default location is C:\Program  
 
 
 
Vbscript Dir Function - Askives Docs 
 
https://docs.askives.com/vbscript-dir-function.html
Read related documents and downloads about Vbscript Dir Function. Find answers researching ebooks, papers or essays. Built-in Functions - InduSoft Web Studio HMI SCADA ...  
 
 
 
How to Use the PHP Text Database API - Suite – A little ... 
 
https://suite.io/mark-alexander-bain/1j9h2aa
Not all web servers have a database (due to technological or financial constraints). However, the PHP programmer can still use SQL with the PHP Text Database API.  
 
 
 
[4/5] Free Directory Script "API_HOME_DIR" File Inclusion ... 
 
www.adslgr.com/forum/archive/index.php/t-249285.html
Ghost Hacker has discovered a vulnerability in Free Directory Script, which can be exploited by malicious people to compromise a vulnerable system.  
 
 
 
Dear CSLH user, 
 
www.cslh.com/security.05.04.htm
If you installed using the txt-db-api you can fix this Issue by uncommenting the lines that define $API_HOME_DIR and $DB_DIR in txt-db-api.php to what they are defined as in config.php. just copy over the $API_HOME_DIR and $DB_DIR definitions from config.php to your txt-db-api.php file.    
 
 
VULNERABILITIES \ FIXES - November 19, 2008 - CNET Spyware ... 
 
forums.cnet.com/7723-6132_102-316974/vulnerabilities...
Spyware, viruses, & security forum: VULNERABILITIES \ FIXES - November 19, 2008 . by: Marianna Schmudlach November 19, 2008 8:46 AM PST. Share; Like this . 0 people like this thread. ... Input passed to the "API_HOME_DIR" parameter in init.php is not properly verified before being ...  
 
 
 
How to Use the PHP Text Database API: Running SQL on a Text ... 
 
www.fardien.com/?p=61
$API_HOME_DIR – this must be set to the directory that contains the PHP Text Database API files $DB_DIR – this is the folder that will contain any databases that are created; For example these may look something like: $API_HOME_DIR=”C:\php-txt-db-api\”;    
 
 
Google Dorks for LFI #llllllllllllllll - Pastebin.com 
 
pastebin.com/uyDppHKU
Google Dorks for LFI #llllllllllllllll. By: a guest on Mar 27th, 2013 | syntax: ... API_HOME_DIR= inurl:board= inurl:cat= inurl:client_id= inurl:cmd= inurl:cont= inurl:current_frame= inurl:date= inurl:detail= inurl:dir= ...    
 
 
SecurityFocus 
 
www.securityfocus.com/archive/1/449575
... ##### ##### Bug include_once(API_HOME_DIR . "util.php"); include_once(API_HOME_DIR . "const.php"); include_once(API_HOME_DIR . "stringparser.php"); ...  
 
 
 
CSLH2.9.9 Remote File Include Vulnerabilities [Archief ... 
 
www.webhostingtalk.nl/archive/index.php/t-105906.html
include_once(API_HOME_DIR . "util.php"); include_once(API_HOME_DIR . "const.php"); include_once(API_HOME_DIR . "stringparser.php"); ##### ##### Exploit ##### ##### www.site.com/CSLH2_path/txt-db-api/stringparser.php?API_HOME_DIR=sh3ll? www.site.com/CSLH2 ...  
 
 
 
2008878 < Main < EmergingThreats 
 
doc.emergingthreats.net/bin/view/Main/2008878
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS $HTTP_PORTS (msg:"ET WEB_SPECIFIC_APPS Free Directory Script 1.1.1 API_HOME_DIR Local File Inclusion"; flow:to_server,established; content:"GET"; http_method; content:"/init.php?"; nocase; http_uri; content:"API_HOME_DIR="; nocase; http_uri; pcre ...  
 
 
 
Computer Experts: Use LFI & RFI dork list for hacking 
 
expertscomp.blogspot.com/2012/04/use-lfi-rfi-dork-list...
LFI Dork List : acion= act= action= API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename=  
 
 
 
Root@Paki -- Dr Trojan-H4x0rL1f3 --: My dorks list for L.F.I 
 
urduhack.blogspot.com/2010/01/my-dorks-list-for-lfi.html
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num ...  
 
 
 
Crafty Syntax Live Help Multiple Remote File Include ... 
 
www.juniper.net/security/auto/vulnerabilities/vuln20711.html...
... to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied input to the 'API_HOME_DIR' parameter of the following scripts: - /txt-db-api/stringparser.php - /txt-db-api/util.php - /txt-db-api/sql.php  
 
 
 
LFI dork by kobez - Pastebin.com 
 
pastebin.com/5VYiD5PC
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num ...    
 
 
Ljuska v2 :: Forums - View topic - LFI 
 
https://www.ljuska.org/viewtopic.php?f=28&t=12563
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num= openfile= p=  
 
 
 
Local File Inclusion(LFI) Tutorial By Mad Jack!(PART 1 ... 
 
ethical-l33ts.blogspot.com/2013/08/local-file-inclusion...
Local File Inclusion(LFI) Tutorial By Mad Jack!(PART 1) Hello everyone ... acion = act = action = API_HOME_DIR = board = cat = client_id = cmd = cont = contact = current_frame = date = detail = dir = display = download = f = file = fileinclude = filename = firm_id = g = getdata = go ...  
 
 
 
Autor Thema: Help with script (Gelesen 6384 mal) 
 
www.codeforum.ch/index.php/topic,3460.0.html
$API_HOME_DIR= "./inc/api/"; $DB_DIR = "./inc/dbs/"; if(!defined("API_HOME_DIR")) define("API_HOME_DIR" ,$API_HOME_DIR); if(!defined("DB_DIR")) define("DB_DIR" ,$DB_DIR); ...  
 
 
 
Crafty Syntax Live Help 2.9.9 - Multiple Remote File Include ... 
 
www.exploit-db.com/exploits/28851
Crafty Syntax Live Help 2.9.9 Multiple Remote File Include Vulnerabilities. Crafty Syntax Live Help 2.9.9 - Multiple Remote File Include Vulnerabilities. EDB-ID: 28851: CVE: N/A : ... http://www.example.com/CSLH2_path/txt-db-api/sql.php?API_HOME_DIR=sh3ll?    
 
 
How to add lead in sugarcrm through shine live 
 
forums.sugarcrm.com/f22/how-add-lead-sugarcrm-through...
$API_HOME_DIR = 'C:\\Projects\\shine\\' . 'txt-db-api/'; $CRM_ISADMIN = 1; # Modify the following variables to enable SugarCRM integration. $SOAP_ENABLED = true; $SUGARDB = 'SugarCRM'; $SUGARDB_USERNAME = 'sugarcrm'; $SUGARDB_PASS = 'sugarcrm';  
 
 
 
Freedirectoryscript Free Directory Script : List of security ... 
 
www.cvedetails.com/vulnerability-list.php?vendor_id=9125...
User: Remote: Medium: Not required: Partial: Partial: Partial: PHP remote file inclusion vulnerability in init.php in Free Directory Script 1.1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the API_HOME_DIR parameter.  
 
 
 
Hacking | Skilz 
 
hackingskilz.blogspot.com
Hacking | Skilz. Home; Downloads. Torrents. Softwares; Movies; Games; Music; Serials; Essential Softwares; System Hacking. Linux Tips; ... API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT=    
 
 
Integration with Shine Live Help - HELP PLEASE 
 
forums.sugarcrm.com/f115/integration-shine-live-help...
// $API_HOME_DIR = 'C:\\Program Files\\sugarcrm-4.5.0h\\htdocs\\sugarcrm\\shine\\' . //'txt-db-api/'; $CRM_ISADMIN = 1; # Modify the following variables to enable SugarCRM integration. $SOAP_ENABLED = true; $SUGARDB = 'sugarcrm'; $SUGARDB_USERNAME = 'aaa';  
 
 
 
Google LFI DORKS Latest | HaCkEr BrAdRi 
 
www.hackerbradri.com/2012/10/google-lfi-dorks-latest.html
Free Download Pro Apps and softwares with key  
 
 
 
Learn | HackingSkillz 
 
hackeramit4u.blogspot.com
acion= act= action= API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main ...    
 
 
sql.php - snews - sNews CMS - Google Project Hosting 
 
code.google.com/p/snews/source/browse/tags/sNews14-txtdb/......
include_once(API_HOME_DIR . "util.php"); include_once(API_HOME_DIR . "const.php"); include_once(API_HOME_DIR . "stringparser.php"); /***** Global vars *****/ // Special Strings in SQL Queries // Insert Strings before Single Chars !! (e.g. >= before >) $g_sqlComparisonOperators=array ...  
 
 
 
List of Google Dorks | H@ck By Mak 
 
www.hackbymak.blogspot.com/2012/04/list-of-google-dorks.html...
List of Google Dorks Axay Makadiya Leave a Comment. After Google Dorks | Using Google efficiently I am here with the huge List of Google Dorks. ... API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g ...  
 
 
 
directory-rfi.txt ≈ Packet Storm 
 
packetstormsecurity.com/files/72069/directory-rfi.txt.html
# init.php?API_HOME_DIR=Evil_Code # ##### #[~]GreetZ : # # Mr.SaFa7 , Mr-3sheq , aBo3tB , Night Mare , Root Hacker , Dmar ...  
 
 
 
LFI Dorks | 倭王武遣使上表曰封國偏遠 
 
homelesshackergroup.blogspot.com/2013/12/lfi-dorks.html
LFI Dorks ! acion= act= action= API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename=  
 
 
 
National Cyber Awareness System - NVD - Detail 
 
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6305
... Script 1.1.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the API_HOME_DIR parameter. Impact CVSS Severity (version 2.0): CVSS v2 Base Score: 6.8 (MEDIUM) (AV:N/AC:M/Au:N/C:P/I:P/A:P) ...  
 
 
 
Txt DB Api – 一个蛮不错的PHP文本数据库 
 
https://www.surfchen.org/archives/88
define(“API_HOME_DIR”,”txtDB/txt-db/”); define(“DB_DIR”,”data/”); $datapath = API_HOME_DIR.’txt-db-api.php’; include $datapath; if (!file_exists(DB_DIR . “txtdbapi-examples”)) {$db = new Database(ROOT_DATABASE);  
 
 
 
googledork for carding | Blog programming and other's 
 
https://yaniarprayogo.wordpress.com/2010/08/17/...
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num ...  
 
 
 
LFI DORK LIST | Hacking Tools And Hacking Tutorials 
 
focsoft.blogspot.com/2014/01/lfi-dork-list.html
LFI DORK LIST. Muhammad Shahbaz Hacking-Tutorials, Website Hacking No comments. LFI DORK LIST>>>>> p4k_sN!p3r ... API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT=  
 
 
 
Dork List ForRFI AND LFI | Learn How To Hack - Ethical ... 
 
www.hackguide4u.com/2010/08/rfi-and-lfi-dork-for.html
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= msg= num= openfile= p=  
 
 
 
#1166829 - Pastie 
 
pastie.org/pastes/1166829
ID = " acion= act= action= API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main ...    
 
 
LFI Dorks - The Hacking Post - Latest hacking News & Security ... 
 
hackingpost.com/lfi-dorks
API_HOME_DIR= board= cat= client_id= cmd= cont= current_frame= date= detail= dir= display= download= f= file= fileinclude= filename= firm_id= g= getdata= go= HT= idd= inc= incfile= incl= include_file= include_path= infile= info= ir= lang= language= link= load= main= mainspot= mainspot= msg= num ...    
 
 


No more results ...
Copyright © 2016 Umuwa. All Rights Reserved. About us / Privacy Policy / Sitemap Most searched