9 lines
No EOL
492 B
Text
Executable file
9 lines
No EOL
492 B
Text
Executable file
source: http://www.securityfocus.com/bid/21156/info
|
|
|
|
20/20 DataShed is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
|
|
|
|
Version 1.0 is vulnerable.
|
|
|
|
http://www.example.com/f-email.asp?strPeopleID=1&itemID='[sql] |