EMO Realty Manager 'cat1' Parameter SQL Injection Vulnerability

An attacker can exploit this issue through a browser.

The following example URI is available:

http://www.example.com/emorealty/googlemap/index.php?cat1=[SQL Injection]


 

Privacy Statement
Copyright 2010, SecurityFocus