The exploit demonstrates SQL injection and authentication bypass vulnerabilities in Photogallery Project 1.0. It includes proof-of-concept payloads for SQLi via the 'page_id' parameter and authentication bypass via crafted login credentials.
Classification
Working Poc 90%
Attack Type
Sqli | Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target:Photogallery Project 1.0
No auth needed
Prerequisites:Access to the vulnerable web application