Exponent CMS Multiple Input Validation Vulnerabilities

To exploit these vulnerabilities, an attacker can use a browser or entice an unsuspecting user into following a malicious URI.

An example URI has been provided:

http://www.example.com/iconspopup.php?icodir=/../../../

The following exploit examples are also available:


 

Privacy Statement
Copyright 2010, SecurityFocus