RCSAB SAC SQL Injection

2015.03.20
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

[+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] ~ Exploit Title : RCSAB SAC SQL Injection ~ Exploit Author : Ashiyane Digital Security Team ~ Vendor Homepage : http://www.webmype.com ~ Google Dork : intext:"Desarrollado por RCSAB SAC" ~ Date: 2015/3/19 ~ Tested On : Windows 7 / Mozilla Firefox [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] ~ demos: http://www.lyesX.com.pe/detalle.php?id=9[sql] http://www.calXzadogmd.com/web/detalle.php?id=137[sql] http://www.mXegasolutions.com.pe/web/detalle.php?id=181[sql] http://enXaeg.edu.pe/detalle.php?id=15[sql] http://www.investaXid.com.pe/detalle.php?id=9[sql] [+][+][+][+] http://www.lyes.cXom.pe/admin http://www.calzadoXgmd.com/admin http://www.megaXsolutions.com.pe/admin http://www.enaXeg.edu.pe/admin http://www.investXaid.com.pe/admin [+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+][+] ~ Discovered By : Cyb3r_Dr4in [+][+][+][+][+][+][+][+][+][+]


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top