lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071109113855.4689.qmail@securityfocus.com> Date: 9 Nov 2007 11:38:55 -0000 From: root@...icker.it To: bugtraq@...urityfocus.com Subject: xoops mylinks module - sql injection I have found a mysql injection vulnerability in mylinks xoops module brokenlink.php page where $_GET['lid'] is not validated by intval() or any other input validation. See: modules/mylinks/brokenlink.php?lid=1%20OR%201=2 or get an error of fetch in the page title