lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.64.0605212142250.26747@forced.attrition.org> Date: Sun, 21 May 2006 21:43:24 -0400 (EDT) From: security curmudgeon <jericho@...rition.org> To: Mster-X@...mail.com Cc: bugtraq@...urityfocus.com Subject: Re: modules name(Sections)SQL Injection Exploit : ******************** : By: Mr-X : Email: Mster-X@...mail.com : Subject: modules name(Sections)SQL Injection : ******************** : : example:- : /modules.php?name=Surveys&op=results&pollID=8&mode=&order=&thold=[SQL] What product is this in? Searching for "modules name sections" is not that helpful.