Description
|
|
Multiple vulnerabilities have been identified in ELOG, which could be exploited by attackers to execute arbitrary commands or scripting code.
The first issue is due to input validation errors when processing the "Type" and "Category" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second flaw is due to a format string error in the "el_submit()" [elogd.c] function when processing attachments with malformed filenames, which could be exploited by attackers to compromise a vulnerable system.
|