The provided text describes a SQL injection vulnerability in VicBlog, where user-supplied input is not properly sanitized before being used in SQL queries. The example demonstrates how an attacker could exploit this by injecting malicious SQL via the 'tag' or 'updated_max' parameters in the URL.
Classification
Writeup 80%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:VicBlog (version not specified)
No auth needed
Prerequisites:Access to the vulnerable VicBlog application