Description
|
|
Two vulnerabilities were identified in Cyphor, which could be exploited by malicious users to perform SQL injection or cross site scripting attacks.
The first issue is due to an input validation in "include/footer.php" when processing a specially crafted "t_login" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second vulnerability is due to an input validation error in "lostpwd.php" when processing a specially crafted "email" or "nick" parameter, which may be exploited by remote users to conduct SQL injection attacks.
|