Advertisement






Powered by BOOMER SQL injection

CVE Category Price Severity
CVE-XXXX-XXXX CWE-89 Varies High
Author Risk Exploitation Type Date
Boomer High Remote 2020-07-20
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020070103

Below is a copy:

Powered by BOOMER SQL injection
#Exploit Title : Powered by BOOMER SQL injection
#Date : 2020-7-19
#Google Dork : inurl:php?id= intext:"Powered by BOOMER"
#Exploit Author : ITH Team ("Avanter,#DC,Mani_Virus,Sensy_Virus,Lynis,Invisable")
#Tested On : Linux/Windows
#CVEs : N/A

.:: PoC ::.

Step 1 : Find Your Target With Google Dork
Step 2 : Test Targets 
Step 3 : And Injection And Enjoy  :) 

.:: Discovered by ::.

Avanter And ITH Team :)


.:: Example ::.

https://www.fluidinova.com/main.php?id=61'

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum