Description
|
|
Multiple vulnerabilities have identified in Jupiter Content Manager, which could be exploited by attackers to disclose sensitive information or execute arbitrary scripting code.
The first is due to an input validation error in the "index.php" script that does not validate the "layout" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to an error in the "modules/online.php" script that does not properly handle empty parameters, which could be exploited by attackers to determine the installation path.
|