Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> PD9 MegaBBS multiple vulnerabilities


Vulnerability Assessment Details

PD9 MegaBBS multiple vulnerabilities

Vulnerability Assessment Summary
Searches for the existence of MegaBBS

Detailed Explanation for this Vulnerability Assessment

The remote host is running MegaBBS, a web-based bulletin board system written
in ASP.

The remote version of this software is vulnerable to a SQL injection attack
due to a lack of sanitization of user-supplied input. A possible hacker may exploit
this flaw to issue arbitrary statements in the remote database, and therefore
bypass authorization or even overwrite arbitrary files on the remote system.

Solution : Upgrade to the latest version of this software (greater than 2.1)
Network Security Threat Level: High

Networks Security ID: 11253

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Samsung Galaxy Note GT-N8013 16GB, Wi-Fi, 10.1in - Gray
$69.95
Samsung Galaxy Note GT-N8013 16GB, Wi-Fi, 10.1in - Gray picture41Y2845 - IBM Samsung 16GB (4x4GB) PC2-5300F DDR2 FB ECC REG Server Memory Kit
$34.99
41Y2845 - IBM Samsung 16GB (4x4GB) PC2-5300F DDR2 FB ECC REG Server Memory Kit picture* LOT OF 8 * 501-5401-03 - Sun Samsung 256MB PC100 ECC REG Server Memory X7053A
$34.99
* LOT OF 8 * 501-5401-03 - Sun Samsung 256MB PC100 ECC REG Server Memory X7053A pictureX5723A - Sun Blade T6300 Samsung 4GB(2x2GB) 2Rx4 PC2-4200 DDR2 Server Memory Kit
$29.99
X5723A - Sun Blade T6300 Samsung 4GB(2x2GB) 2Rx4 PC2-4200 DDR2 Server Memory Kit picture


Discussions

No Discussions have been posted on this vulnerability.