Freepost 'edit.php' SQL Injection and HTML Injection Vulnerabilities

An attacker can exploit these issues using a browser.

The following example URI is available:

http://www.example.com/freepost0.1-R1/edit.php?action=edit&post=1 [SQL CODE]


 

Privacy Statement
Copyright 2010, SecurityFocus