Blind Injection [closed]

Posted by Ajay on Stack Overflow See other posts from Stack Overflow or by Ajay
Published on 2010-06-01T14:47:45Z Indexed on 2010/06/01 14:53 UTC
Read the original article Hit count: 201

Filed under:

Blind SQL Injection

Severity: High

Test Type: Application

Vulnerable URL:

Remediation Tasks: Filter out hazardous characters from user input

Variant 1 of 2 [ID=12654]

The following changes were applied to the original request:

• Set parameter 'nm's value to 'Demography'%20and%20'foobar'='foobar'

© Stack Overflow or respective owner

Related posts about php