lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAPQ_=KX1QpNbzJyoHPr95fJbLjc5s+HU4b01uPD6rSkBP_6SvQ@mail.gmail.com> Date: Thu, 17 Oct 2013 00:01:45 +0800 From: "Wooyun.org" <help.en@...yun.org> To: full-disclosure@...ts.grok.org.uk Subject: [Wooyun]German Nutrition Society website Sql injection *Abstract:* German Nutrition Society website Sql injection *Details:* PHP-Nuke 'sid' Parameter SQL Injection Vulnerability http://www.dge.de/modules.php?name=News&file=article&sid=914 *Proofs of concept:* *[image: 内嵌图片 1] * _______________________________________________ Form: http://en.wooyun.org/bugs/wooyun-2013-02 Author: Finger <http://en.wooyun.org/whitehats/Finger> Content of type "text/html" skipped Download attachment "0113422812f767306b45c694d0ddd3d6a334b017.jpg" of type "image/jpeg" (122045 bytes) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/