Multiple SQL injection vulnerabilities in Hinton Design phphg Guestbook 1.2 allow remote malicious users to execute arbitrary SQL commands via the (1) username parameter to check.php or the id parameter to (2) admin/edit_smilie.php, (3) admin/add_theme.php, (4) admin/ban_ip.php, (5) admin/add_lang.php, or (6) admin/edit_filter.php.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
hinton design phphg guestbook 1.2 |