Zoph Cross-Site Scripting and SQL Injection Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice a victim user to follow a malicious URI.

The following example URI is available:


The following login credentials are reported to trigger this issue:

username: '--
password: '--


Privacy Statement
Copyright 2010, SecurityFocus