PlanetCreator.Net’s Security Team Member has reported another critical SQL Injection (vulnerability) on The New Era Journal http://khitpyaing.org/
These are some information from Vulneral Site http://khitpyaing.org/ :

his vulnerability has been alerted to webmaster

Table

kp_category,kp_comment,kp_news,kp_user,view_count

Columns

edit_id,id,sort_index,text,show_home,parent,parent_id,show_tab,approved,id, news_id,name,email,title,text,type,approved,id,news_title,intro,news_body,keyword, author,news_date,category_id,show_home,top,approved,image,view_count,type,id, name,pwd,email,approved,level,id,news_id,view_count

We hope that your security staff will look into this issue and fix it as soon as possible.

Explore More

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

IntroductionThis tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous.TheoryThe more different hops

Pay safe with your debit card/ bank card/ ATM card? Best practice to safe guard your PIN

In the world of convenience, people resort to different and convenient ways of spending. One such instance is the debit card which replaces cash. It is so convenient and so