Description
|
|
Multiple vulnerabilities have been identified in Seditio, which could be exploited by remote attackers to execute arbitrary SQL commands.
The first flaw is due to an input validation error in the "polls.inc.php" script when processing the "id" parameter, which could be exploited by malicious people to conduct SQL injection attacks.
The second issue is due to input validation errors in the "ipsearch.admin.php", "pfs.edit.inc.php", "users.profile.inc.php", and "users.register.inc.php" scripts when processing certain parameters, which could be exploited by malicious people to conduct SQL injection attacks.
|