PHP Ticket 'p' Parameter SQL Injection Vulnerability

An attacker can exploit the issue using a browser.

The following example URI is available:

http://www.example.com/index.php?p=[SQLi]&id=211&_=1334627588812


 

Privacy Statement
Copyright 2010, SecurityFocus