GEDCOM_to_MySQL2 Multiple Cross-Site Scripting Vulnerabilities

Attackers can exploit these issues by enticing an unsuspecting user to follow a malicious URI.

The following example URIs are available:

http://www.example.com/GEDCOM_to_MySQL2/php/prenom.php?nom_branche=[XSS]
http://www.example.com/GEDCOM_to_MySQL2/php/prenom.php?nom=[XSS]
http://www.example.com/GEDCOM_to_MySQL2/php/index.php?nom_branche=[XSS]
http://www.example.com/GEDCOM_to_MySQL2/php/info.php?nom_branche=[XSS]
http://www.example.com/GEDCOM_to_MySQL2/php/info.php?nom=[XSS]
http://www.example.com/GEDCOM_to_MySQL2/php/info.php?prenom=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus