Home / exploitsPDF  

The Dogma Soft CMS SQL Injection

Posted on 22 April 2012

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 1 0 [x] Official Website: http://www.1337day.com 0 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1 0 0 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 1 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1 ========================================================================== <<<:>>> The Dogma Soft - SQL Injection Vulnerability <<:>>> ========================================================================== - Discovered By: ||| TheCyberNuxbie - Independent Security Research ||| <<< nuxbie@linuxhacktivist.com >>> CP: +62856-2538-963 [ www.linuxhacktivist.com ] $ YM: nux_exploit - Info WebApps: This CMS Develop By The Dogma Soft: http://dogmaindia.com/ - Google Dork: intext:"Developed And Hosted By:- The Dogma Soft" - Exploit Concept: http://lokalisasi/WebApps/news.php?id=[SQL Injection] - Private Area: http://lokalisasi/WebApps/admin/ <--- LogIn Area...!!! - Sampel WebApps Vuln SQL Injection: http://urmidwar.org/news.php?id=37' + [SQL Injection] http://tensionoutservices.com/news.php?nid=22' + [SQL Injection] http://saiacademyamritsar.com/news.php?id=25' + [SQL Injection] -:>>> Special Thanks <<<:- ...:::' 1337day Inj3ct0r TEAM ':::... [ All Staff & 31337 Member Inj3ct0r TEAM ] , And All Inj3ct0r Fans & All Hacktivist,,, :-) ######################################################################### - Me @ Solo Raya, 21 April 2012 @ 11:07 PM. [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de ] #########################################################################

 

TOP