In June 2, an influence on Discuz began to spread on the Internet! X1.5 0-day vulnerability Source: http: www. linuxso. the com1 system is installed with php and added to the system environment variable to open cmd. execute phplinuxso in bat. phphttp: www. xxxxx. com2 and so on. You can get a pony like http: www in just a few minutes. xxx. comdataavatara3
In June 2, an influence on Discuz began to spread on the Internet! 0day vulnerability in X1.5
Source: http://www.linuxso.com
1. The system is installedPhpAnd add the system environment variable to open cmd. bat.
Execute php linuxso. php http://www.xxxxx.com
2. Wait a few minutes to get the pony.
Similar http://www.xxx.com/data/avatar/a/3/a331181442ce6b2ecd9e38569877ec80.php
3. The pony password is cmd and can be directly connected using the pony client.
We recommend that you use our client http://www.linuxso.com/sb.htm to connect to upload a Trojan.
If the php environment is not installed on the local machine, the most foolish way is to download the appserv suite installation.
Download with code: http://www.linuxso.com/linuxExP/discuz1.5x.rar