Page 4 of 26 results (0.008 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Cross-site scripting (XSS) vulnerability in search.php in MyBB (aka MyBulletinBoard) 1.0.2 allows remote attackers with knowledge of the table prefix to inject arbitrary web script or HTML via a URL encoded value of the keywords parameter, as demonstrated by %3Cscript%3E. • http://myimei.com/security/2006-01-14/mybb-102searchphpxss-attackandmore.html http://www.securityfocus.com/archive/1/424334/100/0/threaded http://www.securityfocus.com/archive/1/424375/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24466 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in global.php in MyBB before 1.03 allows remote attackers to execute arbitrary SQL commands via the templatelist variable. • http://community.mybboard.net/showthread.php?tid=6418 http://secunia.com/advisories/18678 http://www.osvdb.org/22903 http://www.vupen.com/english/advisories/2006/0400 https://exchange.xforce.ibmcloud.com/vulnerabilities/24416 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in MyBB (aka MyBulletinBoard) 1.02 allows local users with MyBB administrative privileges to include and possibly execute arbitrary local files via directory traversal sequences and a nul (%00) character in the plugin parameter. • http://www.securityfocus.com/archive/1/423465/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24461 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Add Thread to Favorites feature in usercp2.php in MyBB (aka MyBulletinBoard) 1.02 allows remote attackers to inject arbitrary web script or HTML via an HTTP Referer header ($url variable). • http://www.securityfocus.com/archive/1/423443/100/0/threaded http://www.securityfocus.com/bid/16419 https://exchange.xforce.ibmcloud.com/vulnerabilities/24392 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

Cross-site scripting (XSS) vulnerability in search.php in MyBulletinBoard (MyBB) 1.02 allows remote attackers to inject arbitrary web script or HTML via the (1) sortby and (2) sortordr parameters, which are not properly handled in a redirection. • https://www.exploit-db.com/exploits/27137 http://community.mybboard.net/attachment.php?aid=2181 http://community.mybboard.net/showthread.php?tid=6418 http://seclists.org/lists/bugtraq/2006/Jan/0414.html http://secunia.com/advisories/18617 http://securityreason.com/securityalert/374 http://www.osvdb.org/22750 http://www.securityfocus.com/bid/16387 http://www.vupen.com/english/advisories/2006/0350 https://exchange.xforce.ibmcloud.com/vulnerabilities/24466 •