Doop Content Management System Multiple Input Validation Vulnerabilities

To exploit these vulnerabilities, an attacker can use a browser or entice an unsuspecting user into following a malicious URI.

The following exploit examples are available:


 

Privacy Statement
Copyright 2010, SecurityFocus