Multiple SQL injection vulnerabilities in PhpWebGallery 1.5.1 and previous versions allow remote malicious users to execute arbitrary SQL commands via the (1) since, (2) sort_by, and (3) items_number parameters to comments.php, (4) the search parameter to category.php, and (5) image_id parameter to picture.php. NOTE: it was later reported that the comments.php/sort_by vector also affects 1.7.2 and previous versions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phpwebgallery phpwebgallery 1.6.2 |
||
phpwebgallery phpwebgallery 1.7.1 |
||
phpwebgallery phpwebgallery 1.5.2 |
||
phpwebgallery phpwebgallery 1.3.1 |
||
phpwebgallery phpwebgallery 1.3.3 |
||
phpwebgallery phpwebgallery 1.1 |
||
phpwebgallery phpwebgallery 1.5.0 |
||
phpwebgallery phpwebgallery 1.4.0 |
||
phpwebgallery phpwebgallery 1.4.1 |
||
phpwebgallery phpwebgallery 1.6 |
||
phpwebgallery phpwebgallery 1.3.4 |
||
phpwebgallery phpwebgallery 1.7.0 |
||
phpwebgallery phpwebgallery 1.6.1 |
||
phpwebgallery phpwebgallery |
||
phpwebgallery phpwebgallery 1.2.1 |
||
phpwebgallery phpwebgallery 1.3.2 |
||
phpwebgallery phpwebgallery 1.5.1 |
||
phpwebgallery phpwebgallery 1.6.0 |
||
phpwebgallery phpwebgallery 1.0 |
||
phpwebgallery phpwebgallery 1.3.0 |