Description
|
|
Two vulnerabilities were identified in Easy PX 41, which could be exploited by malicious users to conduct cross site scripting attacks or disclose sensitive information.
The first flaw is due to an input validation error in the "demo.php" script that does not properly filter a specially crafted "digit" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to a design error where the database file "login.db" is publicly accessible via the "modules/login/db" directory, which may be exploited by remote attackers to gain knowledge of sensitive information (usernames and passwords).
|