Full Disclosure mailing list archives
Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE
From: Kai <kai () rhynn net>
Date: Fri, 06 May 2011 21:54:31 +0400
> adu_id adu_user adu_pwd adu_status dept_id remote_access mobile_number > . . . > Acc1041 Risk Risk A Acc lol, definitely a risky guy -- Cheers, Kai _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE d3hydr8 D (May 06)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE Chris M (May 06)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE Kai (May 06)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE CnCxzSec衰仔 (May 06)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE w0lf (May 07)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE Maciej Gojny (May 07)
- Re: CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE w0lf (May 07)
- <Possible follow-ups>
- CCAvenue.com Payment Gateway Vulnerable SQL Injection UPDATE d3hydr8 D (May 06)