Description
|
|
Multiple vulnerabilities have been identified in Photo Organizer, which could be exploited by remote attackers to execute arbitrary SQL commands or bypass security restrictions.
The first flaw is due to an unspecified input validation error when processing certain parameters, which could be exploited by malicious people to conduct SQL injection attacks.
The second issue is due to a design error in various modules that do not validate user permissions, which could be exploited by attackers to bypass security restrictions and perform certain unauthorized actions (e.g. edit or delete arbitrary cameras).
|