SQL-Injection

Re: SQL-Injection

by James McLean -
Number of replies: 0
Those are all common vulnerabilities in web-applications, and the scanning tool was looking for those by entering strings that exploit the vulnerability, if it exists. If the application is vulnerable the results will include the contents of the file, rather than the request itself (as in the result above).


The output above implies that the site is NOT vulnerable, at least in the page and fields that were checked, nothing further needs to be done. Except perhaps disable external user registrations - as that's how I believe that data would have made it into the system.