lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20061126204343.15685.qmail@securityfocus.com> Date: 26 Nov 2006 20:43:43 -0000 From: Advisory@...a-Security.Net To: bugtraq@...urityfocus.com Subject: ClickGallery Sql Injection #Aria-Security Team Advisory #<www.Aria-security.Com For English > #<www.Aria-Security.net For Persian > #----------------------------------------------------------- #Software: Click Gallery #Method: SQL Injection And XSS #Vendor:ClickGallery.net # #PoC: # # #http://target/view_gallery.asp?gallery_id=809¤tpage=[SQL Injection] #http://target/view_gallery.asp?gallery_id=[SQL injection] #http://target/download_image.asp?image_id=[SQL Injection] #http://target/gallery.asp?currentpage=[SQL Injection] #http://target/view_recent.asp?currentpage=[SQL Injection] #http://taget/gallery.asp?currentpage=2&orderby=[SQL Injection] # #You are able to use XSS by searching your script . #example in Search: <script>alert('Aria-Security')</script> # #Contact: Advisory@...a-security.net