Description
SQL injection vulnerability in print.asp in Guo Xu Guos Posting System (GPS) 1.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.
Exploits (1)
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/458061/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0353
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22232
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/31635
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2209
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31759
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23929
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/3195
Scores
EPSS
0.0279
EPSS Percentile
86.2%
Details
Status
published
Products (1)
guo_xu_guos_posting_system/guo_xu_guos_posting_system
1.2
Published
Jan 29, 2007
Tracked Since
Feb 18, 2026