Description
|
|
A vulnerability has been identified in Oi! Email Marketing System, which may be exploited by remote attackers to execute arbitrary SQL commands. This flaw is due to input validation errors in the "registration/login_action.php" script that does not properly validate the "myname" and "pass" parameters (sent via "index.php") before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks and gain unauthorized access to the application.
|