WBBlog Index.PHP Multiple Input Validation Vulnerabilities

An attacker can exploit an SQL-injection vulnerability via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice an unsuspecting victim to follow a malicious URI.

The following example URIs are available:


 

Privacy Statement
Copyright 2010, SecurityFocus