SQL injection and Path Disclosure Auth Bypass in 4images 1.7.X Nov 27 2010 03:41PM
u6q hotmail com
eVuln ID: 200
Software: "Powered by 4images"
Vendor: PHP Web Scripts
Version: 4images 1.7.X
dork: "Powered by 4images"
Critical Level: medium
Type: SQL injection and Path Disclosure
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: ahmed atif ( http://7ria.com/ )
site: http://www.7ria.com/
bug exists in categories.php
Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/xxx/html/hootersflorida/includes/db_mysql.php on line 116
PoC code is available at:
Not available
Vulnerability discovered by Ahmed Atif

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus