Interlink news_information.php XSS

2006-05-20 Thread Mster-X
== Discovery By: Mr-X Site: www.alshmokh.com E-mail: [EMAIL PROTECTED] == Example: /news_information.php?id=12flag=[XSS]

RaceEventManagement --v0.7.6 SQL injection XSS

2006-05-20 Thread Mster-X
Discovery By: Mr-X Site: www.alshmokh.com E-mail: [EMAIL PROTECTED] === Example: /nennung.php?pid=[SQL] /nennung.php?pid=[XSS]

PHP Live Helper ASP(chat.php) XSS

2006-05-12 Thread mster-X
== Credit: Mr-X Site: www.alshmokh.com Email: [EMAIL PROTECTED] == Example:- /chat.php?action=showmainPHPSESSID=XSS

modules name(Sections)SQL Injection Exploit

2006-05-05 Thread Mster-X
By: Mr-X Email: [EMAIL PROTECTED] Subject: modules name(Sections)SQL Injection example:- /modules.php?name=Surveysop=resultspollID=8mode=order=thold=[SQL]

modules name(Downloads)SQL Injection Exploit

2006-05-05 Thread Mster-X
By: Mr-X Email: [EMAIL PROTECTED] Subject: modules name(Downloads)SQL Injection example:- /modules.php?/modules.php?name=Downloadsd_op=viewdownloadcid=[SQL]