Description
|
|
A vulnerability has been identified in CJ Web2Mail, which may be exploited by attackers to inject malicious HTML code. This flaw is due to input validation errors in "thankyou.php" and "web2mail.php" when processing a specially crafted "name", "message", "ip" or "emsg" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
|