DETAILS
Zoomblog is prone to javascript injection attacks.
Zoomblog does not adequately filter tags from various fields.
It is possible for a malicious Zoomblog user to inject hostile javascript code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of Zoomblog.
EXAMPLE
Write a comment with this code:
EXPLOIT
There is no exploit required.
HOMEPAGE
http:/zoomblog.com