CVE-2007-6091

JiRo's Banner System/JUS 2.0 - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in files/login.asp in JiRo's Banner System (JBS) 2.0, and possibly JiRo's Upload Manager (aka JiRo's Upload System or JUS), allow remote attackers to execute arbitrary SQL commands via the (1) Username (aka Login or Email) or (2) Password field.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Aria-Security Team · textwebappsasp
https://www.exploit-db.com/exploits/30775

References (6)

Core 6
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3384
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26479
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/483859/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38740
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38741
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/27713

Scores

EPSS 0.0046
EPSS Percentile 64.3%

Details

CWE
CWE-89
Status published
Products (1)
jiro/banner_system 2.0
Published Nov 22, 2007
Tracked Since Feb 18, 2026