Description
Multiple SQL injection vulnerabilities in JGS-XA JGS-Portal 3.0.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) anzahl_beitraege parameter to jgs_portal.php, 2) year parameter to (jgs_portal_statistik.php, 3) year parameter to (jgs_portal_beitraggraf.php, 4) tag parameter to (jgs_portal_viewsgraf.php, 5) year parameter to (jgs_portal_themengraf.php, 6) year parameter to (jgs_portal_mitgraf.php, 7) id parameter to jgs_portal_sponsor.php, or (8) the Accept-Language header to jgs_portal_log.php.
Exploits (7)
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25676
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25677
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25673
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25679
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25678
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25675
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/25674
References (1)
Core 1
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111627681218415&w=2
Scores
EPSS
0.0031
EPSS Percentile
54.2%
Details
Status
published
Products (1)
jgs-xa/jgs-portal
< 3.0.2
Published
May 17, 2005
Tracked Since
Feb 18, 2026