Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple SQL injection vulnerabilities in DUforum
Detailed Explanation for this Vulnerability Assessment
The remote web server contains an ASP application that is vulnerable
to multiple SQL injection attacks.
The remote host is running DUforum, a web-based message board written
in ASP from DUware.
The installed version of DUforum fails to properly sanitize user-
supplied input in several instances before using it in SQL queries.
By exploiting these flaws, a possible hacker can affect database queries,
possibly disclosing sensitive data and launching attacks against the
See also :
Unknown at this time.
Network Security Threat Level:
Medium / CVSS Base Score : 5
Networks Security ID: 14035
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security
Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/store/select.php on line 4
Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 5
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/store/select.php on line 13
|PMC-SIERRA PM8003 SCC Rev:5.0 PCI-E RAID CONTROLLER CARD
|HP ProLiant DL360 G7 VMware Server 2x 2.80GHz X5660 Hexa Core 144Gb 4x 72Gb Raid
|Dell Precision T1650 (Win 10, Core i7, 16GB RAM, NVS 510, 500GB RAID)
|LSI MR SAS 8888ELP 8-Channel SAS RAID Controller L3-01119-14B 370-2048-00 PCIex8
Warning: mysql_connect() [function.mysql-connect]: Too many connections in /home/vscan/public_html/comments.php on line 3
Warning: mysql_select_db() expects parameter 2 to be resource, boolean given in /home/vscan/public_html/comments.php on line 4
Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/vscan/public_html/comments.php on line 16
No Discussions have been posted on this vulnerability.