Dear [EMAIL PROTECTED], durito [damagelab] -durito[at]mail[dot]ru- reported SQL injection vulnerability in enVivo!CMS through ID parameter of default.asp.
Example: http://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP+1+username+from+users)-- Original message (in Russian): http://securityvulns.ru/Rdocument425.html -- http://securityvulns.com/ /\_/\ { , . } |\ +--oQQo->{ ^ }<-----+ \ | ZARAZA U 3APA3A } You know my name - look up my number (The Beatles) +-------------o66o--+ / |/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/