Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> JGS-Portal Multiple XSS and SQL injection Vulnerabilities


Vulnerability Assessment Details

JGS-Portal Multiple XSS and SQL injection Vulnerabilities

Vulnerability Assessment Summary
JGS-Portal Multiple XSS and SQL injection Vulnerabilities

Detailed Explanation for this Vulnerability Assessment

The remote host is running the JGS-Portal, a web portal written in PHP.

The remote version of this software contains an input validation flaw leading
multiple SQL injection and XSS vulnerabilities. A possible hacker may exploit these
flaws to execute arbirtrary SQL commands against the remote database and to
cause arbitrary code execution for third party users.

Solution : Unknown at this time
Network Security Threat Level: High

Networks Security ID: 13650

Vulnerability Assessment Copyright: Copyright (C) 2005 Josh Zlatin-Amishav

Cables, Connectors

1978 Microcomputer Handbook ADM-3A SOL-20 Altair 8800 KIM-1 OP-80A Paper Tape
$28.0
1978 Microcomputer Handbook ADM-3A SOL-20 Altair 8800 KIM-1 OP-80A Paper Tape pictureAltair 8800 Steve Wozniak Mark-8 Whirlwind Core Memory Jack Kilby ENIAC Apple 1
$32.0
Altair 8800 Steve Wozniak Mark-8 Whirlwind Core Memory Jack Kilby ENIAC Apple 1 picture1981 STD TRS-80 Apple II S-100 Bus Handbook MITS Altair 8800 IMSAI 8080 Z80 etc
$29.0
1981 STD TRS-80 Apple II S-100 Bus Handbook MITS Altair 8800 IMSAI 8080 Z80 etc picture1979 Computer Guide Altair 8800 SOL-20 Poly 88 North Star OSI C4P Apple II Exidy
$34.0
1979 Computer Guide Altair 8800 SOL-20 Poly 88 North Star OSI C4P Apple II Exidy picture


Discussions

No Discussions have been posted on this vulnerability.