source: https://www.securityfocus.com/bid/19327/info
Vwar is prone to multiple input-validation vulnerabilities, including cross-site scripting and SQL-injection issues. These issues occur because the application fails to properly sanitize user-supplied input.
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
http://www.example.com/vwar/war.php?s=[SQL]
http://www.example.com/vwar/war.php?page=[SQL]or[xss]
http://www.example.com/vwar/war.php?showgame=[SQL]
http://www.example.com/vwar/war.php?sortby=[sql]
http://www.example.com/vwar/war.php?sortorder=[sql]
http://www.example.com/vwar/calendar.php?year=[xss]