NWOM TopSites Multiple Input Validation Vulnerabilities

An attacker can exploit these issues via a web client. To exploit a cross-site scripting vulnerability, an attacker must entice a victim user to follow a malicious URI.

The following proof-of-concept URIs are available:


 

Privacy Statement
Copyright 2010, SecurityFocus