Rapid Classified Multiple Input Validation Vulnerabilities

Attackers can exploit these issues via a web client.

Example URIs have been provided:

SQL-injection:
http://www.example.com/viewad.asp?id='[sql]

Cross-site scripting:
http://www.example.com/reply.asp?id=[xss]
http://www.example.com/view_print.asp?id=[xss]
http://www.example.com/search.asp?categoryName=1&SH1=[xss]
http://www.example.com/reply.asp?id=50120815480100001&name=[xss]
http://www.example.com/advsearch.asp?zipr=1&D1=0&D4=1&zipOpt=20&dosearch=[xss]


 

Privacy Statement
Copyright 2010, SecurityFocus