PlanetCreator has reported Critical XSS vulnerability on Official Portal of Kuala Lumpur, Malaysia Web Site,

http://www.planetcreator.net/2009/09/criti…aysia-web-site/

and

http://www.xssed.com/mirror/64058/

but nobody takes action ~~~ How come?

Hello, DBKL’s Staffs! Are you just looking for your license fees? (Yeah- I paid 300RM for my company and 100RM for your Teh Tarik (Coffe` Fees), cos if you don’t pay money to DBKL, you won’t get license as well…

tongue.gif

) …

Don’t just going to around and finding some funds for urself, come up and check out ur web! Many Hackers are watching .Gov websites!….

This is second time!

Applications: ———— PlanetCreator’s_Universal_Advanced_Internet_Security_T00L
System Time: ———— (UTC+08:00) Kuala Lumpur, Singapore, 1/30/2010 11:01:56 PM
Microsoft SQL Server 2000 – 8.00.2050 (Intel X86) Mar 7 2008 21:29:56 Copyright © 1988-2003 Microsoft Corporation
Enterprise Edition on Windows NT 5.2 (Build 3790: Service Pack 2)

Databases: master
————tempdb
————model
————msdb
————pubs
————Northwind
————DBKL
————penjaja
————dbkl_test
————dbkl_datakeyin
————lesendmg

This is your Tables & Columns

Download Tables & Columns ! http://www.planetcreator.net/images/mmso/dbkl.txt

We hope that their security staff will look into this issue and fix it as soon as possible.

Explore More

critical XSS vulnerability on Accounts Chamber of the Russian Federation http://www.ach.gov.ru

PlanetCreator.Net’s Security Team Member has reported another critical XSS vulnerability on Accounts Chamber of the Russian Federation http://www.ach.gov.ru These are some information from Vulneral Site http://www.ach.gov.ru: This vulnerability has been

Critical Blind SQL injection in ChartNexus.com

PlanetCreator has reported another critical Blind SQL Injection (vulnerability) on http://www.starinvestorrelations.com/ which owned by FiNEX Solutions Pte. Ltd. (“FiNEX Solutions”) powered by http://www.chartnexus.com/ This vulnerability has been alerted to :-

What are snort rules?

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule