9 lines
No EOL
588 B
Text
9 lines
No EOL
588 B
Text
source: https://www.securityfocus.com/bid/14876/info
|
|
|
|
MX Shop is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
|
|
|
|
Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
|
|
|
|
http://www.example.com/index.php?mod=pages&idp='[SQL INJECTION]
|
|
http://www.example.com/index.php?mod=pages&id_ctg='[SQL INJECTION]
|
|
http://www.example.com/index.php?mod=pages&id_prd='[SQL INJECTION] |