6.4
CVSSv2

CVE-2006-1659

Published: 07/04/2006 Updated: 18/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 665
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in Softbiz Image Gallery allow remote malicious users to execute arbitrary SQL commands via the (1) id parameter in image_desc.php, (2) provided parameter in template.php, (3) cid parameter in suggest_image.php, (4) img_id parameter in insert_rating.php, and (5) cid parameter in images.php.

Vulnerable Product Search on Vulmon Subscribe to Product

softbiz image gallery

Exploits

source: wwwsecurityfocuscom/bid/17339/info Softbiz Image Gallery is prone to multiple SQL-injection vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query A successful exploit could allow an attacker to compromise the application, access or ...
source: wwwsecurityfocuscom/bid/17339/info Softbiz Image Gallery is prone to multiple SQL-injection vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query A successful exploit could allow an attacker to compromise the application, access or modify d ...
source: wwwsecurityfocuscom/bid/17339/info Softbiz Image Gallery is prone to multiple SQL-injection vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query A successful exploit could allow an attacker to compromise the application, access or modify ...
source: wwwsecurityfocuscom/bid/17339/info Softbiz Image Gallery is prone to multiple SQL-injection vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query A successful exploit could allow an attacker to compromise the application, access or modi ...
source: wwwsecurityfocuscom/bid/17339/info Softbiz Image Gallery is prone to multiple SQL-injection vulnerabilities These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query A successful exploit could allow an attacker to compromise the application, access or mo ...