Blind Injection [closed]
- by Ajay
Blind SQL Injection
Severity: High
Test Type: Application
Vulnerable URL:
Remediation Tasks: Filter out hazardous characters from user input
Variant 1 of 2 [ID=12654]
The following changes were applied to the original request:
• Set parameter 'nm's value to 'Demography'%20and%20'foobar'='foobar'