Phpclanwebsite "par" and "poll_id" Remot
This is a discussion about Phpclanwebsite "par" and "poll_id" Remot in the Warp2search Hang Out category; Phpclanwebsite par and poll_id Remote SQL Injection Vulnerabilities Multiple vulnerabilities were identified in Phpclanwebsite, which could be exploited by remote attackers to execute arbitrary SQL commands.
This topic was started by Jackass, . Last reply by Jackass,
Phpclanwebsite "par" and "poll_id" Remote SQL Injection Vulnerabilities
Multiple vulnerabilities were identified in Phpclanwebsite, which could be exploited by remote attackers to execute arbitrary SQL commands. These flaws are due to input validation errors in the "index.php" script that does not properly validate the "par" and "poll_id" parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
Review
Multiple vulnerabilities were identified in Phpclanwebsite, which could be exploited by remote attackers to execute arbitrary SQL commands. These flaws are due to input validation errors in the "index.php" script that does not properly validate the "par" and "poll_id" parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
Review
Participate in our website and join the conversation
This subject has been archived. New comments and votes cannot be submitted.