Beacon Media suffers from a remote SQL injection vulnerability.
9c216ebafceb2b281b9c30fb3df8250910da865fb4466f87532b42cca48bd018
.___ .___ .__ _________ .___
| | ____ __| _/ ____ ____ ____ ______|__|_____ ____ \_ ___ \ ____ __| _/ ____ _______
| | / \ / __ | / _ \ / \ _/ __ \ / ___/| |\__ \ / \ / \ \/ / _ \ / __ | _/ __ \ \_ __ \
| || | \/ /_/ | ( <_> )| | \\ ___/ \___ \ | | / __ \_| | \\ \____( <_> )/ /_/ | \ ___/ | | \/
|___||___| /\____ | \____/ |___| / \___ >/____ >|__|(____ /|___| / \______ / \____/ \____ | \___ > |__|
\/ \/ \/ \/ \/ \/ \/ \/ \/ \/
[~]===========================================================================[~]
[~]Title : Beacon Media Sql injection Vulnerability
[~]Vendor : http://www.beaconmedia.ca/
[~]Author : tempe_mendoan
[~]Contact : http://indonesiancoder.com/
[~]Google Dork : "Powered by: Beacon Media Inc."
[~]Google Dork : Jakarta , Indonesia ( Februari 2012 )
[~]===========================================================================[~]
#################################################################################
===[ Example Exploit ]===
[?] http://localhost/content.php?id=[SQL]
===[ Admin Login ]===
[?] http://localhost/admin/login.php
##################################################################################
Greats T0 :
./ And All My Friend
Note :
./ I Love You Dila :*