Description
Multiple SQL injection vulnerabilities in Image Gallery with Access Database allow remote attackers to execute arbitrary SQL commands via (1) the id parameter to (a) dispimage.asp, or the (2) order or (3) page parameter to (b) default.asp.
Exploits (2)
exploitdb
WRITEUP
VERIFIED
by Aria-Security Team · textwebappsasp
https://www.exploit-db.com/exploits/29053
exploitdb
WRITEUP
VERIFIED
by Aria-Security Team · textwebappsasp
https://www.exploit-db.com/exploits/29054
References (3)
Core 3
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2147
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21131
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/451875/100/0/threaded
Scores
EPSS
0.0095
EPSS Percentile
76.5%
Details
Status
published
Products (1)
image_gallery_with_access_database/image_gallery_with_access_database
Published
Jan 16, 2007
Tracked Since
Feb 18, 2026