Description
|
|
Multiple vulnerabilities have been identified in cjGuestbook, which may be exploited by attackers to execute arbitrary scripting code. These flaws are due to input validation errors in the "sign.php" script that does not validate the "name", "email", "add", "wName", and "comments" parameters before being added to the guestbook and displayed via the "index.php" script, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|