Page 4 of 21 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in global.php in MyBB before 1.03 allows remote attackers to execute arbitrary SQL commands via the templatelist variable. • http://community.mybboard.net/showthread.php?tid=6418 http://secunia.com/advisories/18678 http://www.osvdb.org/22903 http://www.vupen.com/english/advisories/2006/0400 https://exchange.xforce.ibmcloud.com/vulnerabilities/24416 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

Cross-site scripting (XSS) vulnerability in search.php in MyBulletinBoard (MyBB) 1.02 allows remote attackers to inject arbitrary web script or HTML via the (1) sortby and (2) sortordr parameters, which are not properly handled in a redirection. • https://www.exploit-db.com/exploits/27137 http://community.mybboard.net/attachment.php?aid=2181 http://community.mybboard.net/showthread.php?tid=6418 http://seclists.org/lists/bugtraq/2006/Jan/0414.html http://secunia.com/advisories/18617 http://securityreason.com/securityalert/374 http://www.osvdb.org/22750 http://www.securityfocus.com/bid/16387 http://www.vupen.com/english/advisories/2006/0350 https://exchange.xforce.ibmcloud.com/vulnerabilities/24466 •

CVSS: 4.3EPSS: 7%CPEs: 7EXPL: 3

Cross-site scripting (XSS) vulnerability in MyBulletinBoard (MyBB) allows remote attackers to inject arbitrary web script or HTML via a signature containing a JavaScript URI in the SRC attribute of an IMG element, in which the URI uses SGML numeric character references without trailing semicolons, as demonstrated by "&#106&#97&#118&#97&#115&#99&#114&#105&#112&#116". • http://archives.neohapsis.com/archives/bugtraq/2006-01/0332.html http://secunia.com/advisories/18544 http://www.osvdb.org/22628 http://www.securityfocus.com/bid/16308 http://www.vupen.com/english/advisories/2006/0255 https://exchange.xforce.ibmcloud.com/vulnerabilities/24225 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 1%CPEs: 12EXPL: 0

Cross-site scripting (XSS) vulnerability in printthread.php in MyBB 1.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a thread message, which is not properly sanitized in the print view of the thread. • http://secunia.com/advisories/18281 http://securityreason.com/securityalert/310 http://www.osvdb.org/21601 http://www.securityfocus.com/archive/1/420569/100/0/threaded http://www.securityfocus.com/bid/16096 http://www.vupen.com/english/advisories/2006/0012 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

Multiple SQL injection vulnerabilities in MyBulletinBoard (MyBB) 1.00 RC4 allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to calendar.php, (2) idsql parameter to online.php, (3) usersearch parameter to memberlist.php, (4) pid parameter to editpost.php, (5) fid parameter to forumdisplay.php, (6) tid parameter to newreply.php, (7) sid parameter to search.php, (8) tid or (9) pid parameter to showthread.php, (10) tid parameter to usercp2.php, (11) tid parameter to printthread.php, or (12) pid parameter to reputation.php. • https://www.exploit-db.com/exploits/1022 http://marc.info/?l=bugtraq&m=111757191118050&w=2 http://secunia.com/advisories/15552 http://www.mybboard.com/community/showthread.php?tid=2559 http://www.osvdb.org/17024 •