|
Megamail Product_Review.PHP Multiple SQL Injection Vulnerabilities
An attacker can exploit these issues via a web client. The following proof-of-concept URIs are available: http://example.com/mega-mall/product_review.php?t=[sql] http://example.com/mega-mall/product_review.php?t=0&productId=[sql] http://example.com/mega-mall/product_review.php?t=0&productId=1004&sk=[sql] http://example.com/mega-mall/product_review.php?t=0&productId=1004&t=0&x=[sql] http://example.com/mega-mall/product_review.php?t=0&productId=1004&sk=USERID&so=[sql] http://example.com/mega-mall/order-track.php?Enter=1&orderNo=[sql] |
|
Privacy Statement |