source: https://www.securityfocus.com/bid/19327/info Vwar is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues. These issues occur because the application fails to properly sanitize user-supplied input. A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible. http://www.example.com/vwar/war.php?s=[SQL] http://www.example.com/vwar/war.php?page=[SQL]or[xss] http://www.example.com/vwar/war.php?showgame=[SQL] http://www.example.com/vwar/war.php?sortby=[sql] http://www.example.com/vwar/war.php?sortorder=[sql] http://www.example.com/vwar/calendar.php?year=[xss]