Akiva WebBoard 'name' Parameter SQL Injection Vulnerability

Attackers can use a browser to exploit this issue.

The following example URL is available:

http://www.example.com/WB/Default.asp?LogIn=yes&action=7


 

Privacy Statement
Copyright 2010, SecurityFocus