Description
|
|
Multiple vulnerabilities have been identified in Project EROS bbsengine, which could be exploited by remote attackers to execute arbitrary SQL commands or malicious scripting code.
The first flaw is due to input validation errors in the "php/comment.php" and "php/aolbonics.php" scripts that do not validate certain parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second flaw is due to an input validation error in the "preparestring()" function that does not validate user-supplied parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The third vulnerability is due to an input validation error when processing "[img]" tags, which could be exploited by malicious people to conduct cross site scripting attacks.
|