The provided text describes an SQL injection vulnerability in VicBlog, where the 'tag' parameter in the URL is not properly sanitized, allowing attackers to manipulate SQL queries. The example demonstrates a basic SQLi payload but lacks functional exploit code.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Theoretical
Target:VicBlog (version unspecified)
No auth needed
Prerequisites:Access to the VicBlog web application