Blind Injection [closed]
Posted
by Ajay
on Stack Overflow
See other posts from Stack Overflow
or by Ajay
Published on 2010-06-01T14:47:45Z
Indexed on
2010/06/01
14:53 UTC
Read the original article
Hit count: 201
php
Blind SQL Injection
Severity: High
Test Type: Application
Vulnerable URL:
Remediation Tasks: Filter out hazardous characters from user input
Variant 1 of 2 [ID=12654]
The following changes were applied to the original request:
• Set parameter 'nm's value to 'Demography'%20and%20'foobar'='foobar'
© Stack Overflow or respective owner