Jax Guestbook Page Parameter Cross-Site Scripting Vulnerability

This issue can be exploited through a web client.

An example URI has been provided:

http://www.example.com/jax_guestbook.php?page=[XSS]&language=english
http://www.example.com/guestbook.admin.php?action=list&guestbook_id=0&language=german&gmt_ofs=0&page=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus