Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Silent-Storm Portal Multiple Input Validation Vulnerabilities


Vulnerability Assessment Details

Silent-Storm Portal Multiple Input Validation Vulnerabilities

Vulnerability Assessment Summary
Checks for vulnerabilities in Silent-Storm Portal

Detailed Explanation for this Vulnerability Assessment

The remote host is running Silent-Storm, a web-based forum management software
written in PHP.

There are multiple input validation flaws in the remote version of this
software :

- There is a cross site scripting vulnerability affecting the file 'index.php'
- A possible hacker may corrupt the user database by creating a malformed username

Solution : Upgrade to the newest version of this software.
Network Security Threat Level: Medium

Networks Security ID: 11284

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Vintage Apple Pro Mac iMac G4 Harmon Kardon Speakers M6531 Round Clear Speaker
$19.99
Vintage Apple Pro Mac iMac G4 Harmon Kardon Speakers M6531 Round Clear Speaker pictureAPPLE STORE POSTER Size 28"x22" Sherlock Mac OS 8.5 Original Vintage Rare 1998
$33.95
APPLE STORE POSTER Size 28APPLE COMPUTER Sticker RAINBOW Laptop Decal Vintage Logo Macintosh MAC LIMITED
$12.99
APPLE COMPUTER Sticker RAINBOW Laptop Decal Vintage Logo Macintosh MAC LIMITED  pictureVintage Genuine Apple iMac System Disc Set for iMac DV Models Mac OS 9.0.4
$15.0
Vintage Genuine Apple iMac System Disc Set for iMac DV Models Mac OS 9.0.4  picture


Discussions

No Discussions have been posted on this vulnerability.