Description
|
|
Multiple vulnerabilities have been identified in photokorn, which may be exploited by remote attackers to execute arbitrary SQL commands. These flaws are due to input validation errors in the "index.php", "postcard.php", and "print.php" scripts that do not validate the "cat", "pic", "id", and "page" parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
|