Zoph Cross-Site Scripting and SQL Injection Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice a victim user to follow a malicious URI.

The following example URI is available:

http://www.example.com/demo/search.php?_action=search&_off=[EvilScript]

The following login credentials are reported to trigger this issue:

username: '--
password: '--


 

Privacy Statement
Copyright 2010, SecurityFocus