2 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

Online Art Gallery v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'lnm' parameter of the header.php resource does not validate the characters received and they are sent unfiltered to the database. Online Art Gallery v1.0 es vulnerable a múltiples vulnerabilidades de inyección SQL no autenticada. El parámetro 'lnm' del recurso header.php no valida los caracteres recibidos y se envían sin filtrar a la base de datos. • https://fluidattacks.com/advisories/ono https://https://projectworlds.in • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 2%CPEs: 1EXPL: 2

Projectworlds Online Art Gallery Project 1.0 allows unauthenticated users to perform arbitrary file uploads via the adminHome.php page. Note: This has been disputed as not a valid vulnerability. • https://github.com/Trinity-SYT-SECURITY/arbitrary-file-upload-RCE/blob/main/Online%20Art%20gallery%20project%201.0.md https://www.chtsecurity.com/news/ad3cee07-3e35-45c0-97f9-811cce13dda9 https://www.chtsecurity.com/news/afe25fb4-55ac-45d9-9ece-cbc1edda2fb2%20 https://www.exploit-db.com/exploits/51524 • CWE-434: Unrestricted Upload of File with Dangerous Type •