WordPress CStar Design 'id' Parameter SQL Injection Vulnerability

An attacker can exploit this issue using a browser.

The following example URI is available:

http://www.example.com/wp-content/themes/cstardesign/swf/flashmo/flashmoXML.php?id=[SQL]


 

Privacy Statement
Copyright 2010, SecurityFocus