Description
|
|
Multiple vulnerabilities have been identified in VUBB, which could be exploited by remote attackers to perform SQL injection and cross site scripting. These flaws are due to input validation errors in the "register()" [includes/functions.php] function that does not validate the "user" and "email" parameters, which could be exploited by malicious people to execute arbitrary SQL queries or cause malicious scripting code to be executed by the user's browser.
Note : Various scripts do not properly handle invalid or empty parameters, which could be exploited by attackers to determine the installation path.
|