Description
SQL injection vulnerability in the My_eGallery module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the gid parameter in a showgall action to modules.php. NOTE: this issue was disclosed by an unreliable researcher, so the details might be incorrect.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Aria-Security Team · textwebappsphp
https://www.exploit-db.com/exploits/5203
References (6)
Core 6
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28030
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/488916/100/100/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40910
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5203
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5242
Exploit vdb-entry
x_refsource_osvdb
http://osvdb.org/51021
Scores
EPSS
0.0122
EPSS Percentile
79.1%
Details
CWE
CWE-89
Status
published
Products (1)
maxdev/my_egallery
Published
Aug 24, 2009
Tracked Since
Feb 18, 2026