11 lines
No EOL
366 B
Text
Executable file
11 lines
No EOL
366 B
Text
Executable file
source: http://www.securityfocus.com/bid/13836/info
|
|
|
|
livingmailing is prone to an SQL injection vulnerability.
|
|
|
|
This issue is due to a failure in the application to properly sanitize user-supplied input to the 'login.asp' script.
|
|
|
|
livingmailing 1.3 is reported vulnerable.
|
|
|
|
The following proof of concept is available:
|
|
Username =admin
|
|
Password= ' or ''=' |