|
Easebay Resources Login Manager Multiple Input Validation Vulnerabilities
To exploit a cross-site scripting issue: An attacker can exploit this issue by enticing an unsuspecting user into following a malicious URI. An example URI has been provided: http://www.example.com/path/admin/memberlist.php?keyword=[XSS]&type=1&status=1&by=1&sbmt1=++Search++&accessname=0&init_row=0&sort=create_time&sq=desc To exploit an SQL-injection issue: An attacker can exploit this issue via a web client. An example URI has been provided: http://www.example.com/path/admin/memberlist.php?init_row=[SQL] |
|
Privacy Statement |