How is Javascript going to do a SQL injection ? On Fri, Jun 19, 2009 at 08:16, NationPress <i...@nationpress.com> wrote:
> > The client we're building a site for recently had a server wide scan > done by SecurityMetrics.com for PCI compliance. This was required by > their banks commercial credit card service. The report came back with > a "Possible blind sql injection" vulnerability warning level 4 out of > 7 for the Superfish menu javascript. Anything 4 and above keeps them > out of compliance. This file is for the Superfish menu. Is there a > workaround for this potential issue? >