VicBlog is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.
Credit:
The information has been provided by Geek.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Attackers can use a browser to exploit these issues.
The following example URI is available:
http://www.example.com/domain.tld/index.php?page=posts${tag or upated_max paramater}=1[SQLi]