The script provides no proper handling of search strings sent directly to the
database. If you do not run with magic_quotes on, a search string like
" UNION SELECT password FROM mysql.user; --
leaves you open to sql injection attacks.
Original issue reported on code.google.com by sno...@gmail.com on 2 Oct 2010 at 2:07
Original issue reported on code.google.com by
sno...@gmail.com
on 2 Oct 2010 at 2:07