Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
ASPjar Guestbook SQL Injection
Information
Severity
Severity
Medium
Family
Family
Web application abuses
CVSSv2 Base
CVSSv2 Base
5.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Solution Type
Solution Type
Mitigation
Created
Created
18 years ago
Modified
Modified
5 years ago
Summary
The remote host is running ASPJar's GuestBook, a guestbook application written in ASP. The remote version of this software is vulnerable to a SQL injection vulnerability which allows a remote attacker to execute arbitrary SQL statements against the remote DB. It is also vulnerable to an input validation vulnerability which may allow an attacker to perform a cross site scripting attack using the remote host.
Solution
Solution
Delete this application.