DETAILS Zoomblog is prone to javascript injection attacks. Zoomblog does not adequately filter tags from various fields. It is possible for a malicious Zoomblog user to inject hostile javascript code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of Zoomblog. EXAMPLE Write a comment with this code: EXPLOIT There is no exploit required. HOMEPAGE http:/zoomblog.com