Home / os / win8

Upgeneration Sql Injection Vulnerability

Posted on 30 November -0001

<HTML><HEAD><TITLE>upgeneration Sql Injection Vulnerability</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY>|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||* ||*||*||*||*| |-------------------In The Name Of God------------------------| |[+] Exploit Title : upgeneration Sql Injection Vulnerability |[+] Exploit Author : Ashiyane Digital Security Team |[+] Vendor Homepage : http://www.upgeneration.it/ |[+] Google Dork : " inurl:index.php?page=pagine&id_page=176 & intext:Warning: mysql_num_rows" |[+] Tested on : Windows 10 ~~> Mozilla Firefox |[+] Contact: shahroukh06@gmail.com |[+] Date : 1/---/2017 |[+]======================================| |[+] Then Choose a Target and put this after URL : /admin |[+]======================================| |[+] Proof: |[+] http://www.sperifightclub.it/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.ristorantemichelin.com/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.pietrefortetesoro.it/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.articoliregalocastionibussolengo.it/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.stampagraficaverona.it/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.cctraslocatori.eu/index.php?page=pagine&id_page=176 [SQLI] |[+] http://www.ilem.it//index.php?page=pagine&id_page=176 [SQLI] |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||* ||*||*||*||*| |[+] Discovered By : sir shahroukh |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||* ||*||*||*||*|</BODY></HTML>

 

TOP