PlanetCreator has reported another critical SQL Injection (vulnerability) on Gulf Tranvels and Tours : Your reliable agency in Myanmar http://www.myanmartravelsgulf.com powered by IndexMyanmar

This vulnerability has been alerted to :- ” [email protected] , [email protected] , [email protected] , [email protected], [email protected],[email protected] , [email protected]

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.

Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L
System Time: ———— (UTC+08:00) Yangoon, Myanmar , 18/09/2010 09:38:33 PM
Host IP: 198.68.161.4
Database: mmtravelsgulf

Some Tables are as follow :

gulf_welcome
gulf_visa
gulf_trip_info
gulf_trip
gulf_traveltips
gulf_transportation
gulf_route
gulf_rentcar_detail
gulf_rent_carinfo
gulf_rent_car
gulf_promotion
gulf_price
gulf_myanmar_cruise
gulf_jetty
gulf_hoteltype
gulf_hoteldetail
gulf_hotel_list
gulf_footer
gulf_flight_schedule
gulf_embassy
gulf_domestic
gulf_charter
gulf_car_service
gulf_car
gulf_boat
gulf_balloons
gulf_advertise
gulf_admin
gulf_aboutus 

We hope that your security staff will look into this issue and fix it as soon as possible.

Explore More

What are the components of a security evaluation?

Any security evaluation involves three components: * Preparation: In this phase, a formal contract is signed between an ethical hacker and the authority of the organization that contains a non-disclosure

Expert Tips for Keeping Google Hacks at Bay

The first step for protecting yourself from something is knowing how that something works. In the case of Google hacking, you will have to learn how it can be used

Huge internet bill? Are you a zombie? How does your computer act as zombie?

Zombie or zombie computers are becoming the number one source of all malware and spam attacks. A zombie is a computer attached to the Internet that has been compromised by