4Images 1.7.1 - 'top.php?sessionid' SQL Injection

Author: CrAzY.CrAcKeR
type: webapps
platform: php
port: 
date_added: 2006-04-29  
date_updated: 2013-08-22  
verified: 1  
codes: CVE-2006-2214;OSVDB-25153  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 27780.txt  
source: https://www.securityfocus.com/bid/17748/info

4Images is prone to multiple, unspecified SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/top.php?sessionid=[SQL]