Description
|
|
A vulnerability has been identified in Instant Photo Gallery, which may be exploited by attackers to execute arbitrary SQL commands. This flaw is due to an input validation error in the "includes/functions/fns_std.php" script (included via "portfolio_photo_popup.php") that does not validate the "id" parameter before being passed to the "count_click()" function and used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
|