source: https://www.securityfocus.com/bid/41273/info DPScms is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following example URIs are available: http://www.example.com/index.php?q=[SQLI] http://www.example.com/index.php?q=[XSS]