|
Description
|
|
Multiple vulnerabilities have been identified in Docmint, which could be exploited by remote attackers to execute arbitrary commands or scripting code.
The first issues are caused by input validation errors in the "addnote" and "search" interfaces when processing the "id_add" and "search_items" parameters, which could be exploited by attackers to cause malicious scripting code to be executed by the user's browser.
The second vulnerability is caused by input validation errors in the "admin.php" script when processing the "MODULE" and "ACTION" parameters, which could be exploited by attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
|