lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: 26 Apr 2005 21:37:23 -0000
From: dcrab <dcrab@...kerscenter.com>
To: bugtraq@...urityfocus.com
Subject: Multiple SQL Injections in MetaBid Auctions




Dcrab 's Security Advisory
[Hsc Security Group] http://www.hackerscenter.com/
[dP Security] http://digitalparadox.org/

Get Dcrab's Services to audit your Web servers, scripts, networks, etc. 
Learn more at http://www.digitalparadox.org/services.ah

Severity: High
Title: Multiple SQL Injections in MetaBid Auctions
Date: 27/04/2005

Vendor: MetaLinks
Vendor Website: www.metalinks.com
Summary: There are, multiple sql injections in metabid auctions.


Proof of Concept Exploits: 

MetaBid Auctions
http://example.com/metabid/logIn.asp
Both Username and Password fields are vulnerable to sql injections that 
can be used to bypass authentication
SQL INJECTION AND AUTHENTICATION BYPASS


http://example.com/metabid/item.asp?intAuctionID='SQL_INJECTION
SQL INJECTION


Keep your self updated, Rss feed at: http://digitalparadox.org/rss.ah

Author: 
These vulnerabilties have been found and released by Diabolic Crab, Email: 
dcrab[AT|NOSPAM]hackerscenter[DOT|NOSPAM]com, please feel free to contact 
me regarding these vulnerabilities. You can find me at, 
http://www.hackerscenter.com or http://digitalparadox.org/. Lookout for my 
soon to come out book on Secure coding with php.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ