|
Rapid Classified Multiple Input Validation Vulnerabilities
Attackers can exploit these issues via a web client. Example URIs have been provided: SQL-injection: http://www.example.com/viewad.asp?id='[sql] Cross-site scripting: http://www.example.com/reply.asp?id=[xss] http://www.example.com/view_print.asp?id=[xss] http://www.example.com/search.asp?categoryName=1&SH1=[xss] http://www.example.com/reply.asp?id=50120815480100001&name=[xss] http://www.example.com/advsearch.asp?zipr=1&D1=0&D4=1&zipOpt=20&dosearch=[xss] |
|
Privacy Statement |