exploit-db-mirror/platforms/php/webapps/35958.txt
Offensive Security c1539379ff Update: 2015-02-01
7 new exploits
2015-02-01 08:35:41 +00:00

7 lines
No EOL
484 B
Text
Executable file

source: http://www.securityfocus.com/bid/48688/info
The Juicy Gallery component for Joomla! is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
http://www.example.com/index.php?option=com_juicy&task=showComments&picId=[EXPLOIT]