Campus Bulletin Board SQL Injection and Cross-Site Scripting Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice a victim user to follow a malicious URI.

The following proof-of-concept URIs are available:


 

Privacy Statement
Copyright 2010, SecurityFocus