[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WPMU < 2.9.1 PHP Remote Code Execute 0day Exploit

[ 0Day-ID-23419 ]
Full title
WPMU < 2.9.1 PHP Remote Code Execute 0day Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price: 10
Date add
Category
Platform
Verified
Price
 
0.026 BTC

 
2 500 USD
Risk
[
Security Risk Critical
]
Rel. releases
Description
its a straight forward and easy to use exploit that injects a command shell into wp-config.php
Usage info
php exp.php <target> (don't forget to add http)
Vendor
http://codex.wordpress.org/WPMU
Affected ver
all < 2.9.1
Solution
update to last version 2.9.2
Tags
WPMU   wordpress   command   exec   php   remote  
Other Information
Abuses
0
Comments
12
Views
9 196
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Please login or register to buy exploit.
OR
Buy incognito
0
0
Verified by 0day Admin
Verified by 0day Admin
This material is checked by Administration and absolutely workable.
Learn more about    GOLD:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
We accept:
BitCoin (BTC)
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH

Author
BL
29
Exploits
1
Readers
2
[ Comments: 12 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Login or register to leave comments