PlanetCreator.Net’s Security Team Member has reported another critical SQL Injection (vulnerability) on The New Era Journal http://khitpyaing.org/
These are some information from Vulneral Site http://khitpyaing.org/ :

his vulnerability has been alerted to webmaster

Table

kp_category,kp_comment,kp_news,kp_user,view_count

Columns

edit_id,id,sort_index,text,show_home,parent,parent_id,show_tab,approved,id, news_id,name,email,title,text,type,approved,id,news_title,intro,news_body,keyword, author,news_date,category_id,show_home,top,approved,image,view_count,type,id, name,pwd,email,approved,level,id,news_id,view_count

We hope that your security staff will look into this issue and fix it as soon as possible.

Explore More

What are the various Trojan vectors?

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

Security/Hacking Tools & Utilities

1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series.Nmap (”Network Mapper”) is a free open source utility for network exploration or security auditing.

Mobile – Cell phone tracking using Google maps

Did you know that your mobile phone sends out details on your whereabouts every second to the world? If you haven’t heard of it, then its high time to realize