Description
|
|
Multiple vulnerabilities were identified in Bit 5 Blog, which could be exploited by remote attackers to execute arbitrary SQL statements or malicious scripting code.
The first issue is due to an input validation error in the "addcomment.php" script when processing a specially crafted "comment" variable, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second flaw is due to input validation errors in the "processlogin.php" script when processing specially crafted "username" and "password" parameters, which may be exploited by malicious people to conduct SQL injection attacks.
|