Description
|
|
Two vulnerabilities were identified in Ipswitch WhatsUp Gold, which may be exploited by attackers to inject malicious HTML code or disclose sensitive information.
The first flaw is due to an input validation error in "map.asp" when processing a specially crafted "map" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to an error when handling uppercase extensions, which could be exploited by attackers to disclose the source code of the ASP files.
|