Description
|
|
Multiple vulnerabilities have been identified in Phreebooks, which could be exploited by malicious users to execute arbitrary commands or scripting code.
The first issues are caused by input validation errors in the "index.php" script when processing the "cm_address1" and "cm_primary_name" parameters, which could be exploited by malicious users to cause scripting code to be executed by another user's browser.
The second vulnerability is caused by input validation errors in the "index.php" script when processing the "language" and "cat" parameters, which could be exploited by attackers to include or disclose the contents of local files with the privileges of the web server.
|