exploit-db-mirror/exploits/php/webapps/23797.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

7 lines
No EOL
590 B
Text

source: https://www.securityfocus.com/bid/9830/info
It has been reported that an input validation error with the potential for use in a SQL injection attack is present in the "db_mysql_loeschen2.php" script. When a user is requesting the "db_mysql_loeschen2.php" script, one of the parameters that can be passed to the script is "db". There are no checks on the value of this variable before it is used in an SQL query string.
Consequently, malicious users may corrupt the resulting SQL queries by specially crafting a value for the "db" variable.
db_mysql_loeschen2.php?db=' or 1 or 1='