Description
|
|
A vulnerability has been identified in PHP Live!, which may be exploited by attackers to execute arbitrary scripting code. This flaw is due to an input validation error in the "js/status_image.php" script that does not validate the "base_url" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|