<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
	<channel>
		<title><![CDATA[Latest posts for the topic "Advanced Guestbook 2.2 -- SQL Injection Exploit"]]></title>
		<link>https://proxy2.de/forum/posts/list/3.php</link>
		<description><![CDATA[Latest messages posted in the topic "Advanced Guestbook 2.2 -- SQL Injection Exploit"]]></description>
		<generator>JForum - http://www.jforum.net</generator>
			<item>
				<title>Advanced Guestbook 2.2 -- SQL Injection Exploit</title>
				<description><![CDATA[ I found out that Advanced Guestbook 2.2 appears vulnerable to SQL Injection granting the attacker administrator access. The attack is very simple and consists of inputting a special password string leaving the username entry blank: <br /> <br /> So I suggest you upgrade to the latest version.]]></description>
				<guid isPermaLink="true">https://proxy2.de/forum/posts/preList/3036/8042.php</guid>
				<link>https://proxy2.de/forum/posts/preList/3036/8042.php</link>
				<pubDate><![CDATA[Fri, 23 Apr 2004 14:07:36]]> GMT</pubDate>
				<author><![CDATA[ Jam'n]]></author>
			</item>
	</channel>
</rss>