|
Description
|
|
Multiple vulnerabilities have been identified in Jadu CMS, which may be exploited by attackers to execute arbitrary scripting code. These flaws are due to input validation errors in the "site/scripts/register.php" script that does not validate the "forename", "surname", "reg_email", "email_conf", "company", "city", "postcode", and "telephone" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|