Description
|
|
Multiple vulnerabilities have been identified in PacPoll, which may be exploited by attackers to execute arbitrary SQL commands or bypass security restrictions.
The first flaw is due to input validation errors in the "Admin/check.asp" script that does not validate the "uid" and "pwd" parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second issue is due to a design error in the "Admin/adpoll.asp" that does not properly validate the "polllog" cookie parameter, which could be exploited by attackers to gain unathorized access to administrative functionalities.
|