Description
|
|
Two vulnerabilities were identified in Web4Future Portal Solutions, which may be exploited by remote attackers to execute arbitrary SQL commands or disclose sensitive information.
The first flaw is due to an input validation error in the "comentarii.php" script that does not properly validate the "idp" parameter, which may be exploited by malicious people to conduct SQL injection attacks.
The second vulnerability is due to an input validation error in the "arhiva.php" script that does not properly validate the "dir" parameter, which could be exploited by attackers to list the contents of arbitrary directories via directory traversal attacks.
|