|
FishCart Olst Parameter SQL Injection Vulnerability
Attackers can exploit this issue via a web client. The following proof-of-concept URI is available: http://www.example.com/uds/display.php?cartid=200701210157208&zid=1&lid=1&olimit=5&cat=&key1=&nlst=y&olst='[sql] |
|
Privacy Statement |