lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060403140726.21904.qmail@securityfocus.com> Date: 3 Apr 2006 14:07:26 -0000 From: t4h4@...uxmail.org To: bugtraq@...urityfocus.com Subject: Phpwebgallery <= 1.4.1 SQL injection Vulnerability Moroccan Security Team (|ucif3r) Greetz To All Freind Phpwebgallery 1.4.1 is vulnerable to SQL Injection Attacks The flaw is due to input validation errors in the "category.php" script when handling the "search"variables, which could be exploited by malicious people to conduct SQL injection attacks. Exploit: http://localhost/phpwebgallery/category.php?cat=search&search=[SQL] t4h4[at]linuxmail[dot]com :D