Multiple SQL injection vulnerabilities in Gallarific Free Edition 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) query parameter to (a) search.php; (2) gusername and (3) gpassword parameters to (b) login.php; and the (4) username and (5) password parameters to (c) gadmin/index.php in a signin action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/29399 | Vendor Advisory |
http://secunia.com/advisories/29399 | Vendor Advisory |
Configurations
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29399 - Vendor Advisory |
Information
Published : 2008-03-24 21:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1464
Mitre link : CVE-2008-1464
CVE.ORG link : CVE-2008-1464
JSON object : View
Products Affected
gallarific
- gallarific
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')