Page 4 of 21 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in global.php in MyBB before 1.03 allows remote attackers to execute arbitrary SQL commands via the templatelist variable. • http://community.mybboard.net/showthread.php?tid=6418 http://secunia.com/advisories/18678 http://www.osvdb.org/22903 http://www.vupen.com/english/advisories/2006/0400 https://exchange.xforce.ibmcloud.com/vulnerabilities/24416 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

Cross-site scripting (XSS) vulnerability in search.php in MyBulletinBoard (MyBB) 1.02 allows remote attackers to inject arbitrary web script or HTML via the (1) sortby and (2) sortordr parameters, which are not properly handled in a redirection. • https://www.exploit-db.com/exploits/27137 http://community.mybboard.net/attachment.php?aid=2181 http://community.mybboard.net/showthread.php?tid=6418 http://seclists.org/lists/bugtraq/2006/Jan/0414.html http://secunia.com/advisories/18617 http://securityreason.com/securityalert/374 http://www.osvdb.org/22750 http://www.securityfocus.com/bid/16387 http://www.vupen.com/english/advisories/2006/0350 https://exchange.xforce.ibmcloud.com/vulnerabilities/24466 •

CVSS: 4.3EPSS: 7%CPEs: 7EXPL: 3

Cross-site scripting (XSS) vulnerability in MyBulletinBoard (MyBB) allows remote attackers to inject arbitrary web script or HTML via a signature containing a JavaScript URI in the SRC attribute of an IMG element, in which the URI uses SGML numeric character references without trailing semicolons, as demonstrated by "&#106&#97&#118&#97&#115&#99&#114&#105&#112&#116". • http://archives.neohapsis.com/archives/bugtraq/2006-01/0332.html http://secunia.com/advisories/18544 http://www.osvdb.org/22628 http://www.securityfocus.com/bid/16308 http://www.vupen.com/english/advisories/2006/0255 https://exchange.xforce.ibmcloud.com/vulnerabilities/24225 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

The original distribution of MyBulletinBoard (MyBB) to update from older versions to 1.0.2 omits or includes older versions of certain critical files, which allows attackers to conduct (1) SQL injection attacks via an attachment name that is not properly handled by inc/functions_upload.php (CVE-2005-4602), and possibly (2) other attacks related to threadmode in usercp.php. • http://community.mybboard.net/showthread.php?tid=5853&pid=35088#pid35088 http://community.mybboard.net/showthread.php?tid=5853&pid=35151#pid35151 http://community.mybboard.net/showthread.php?tid=5960 http://www.securityfocus.com/bid/16230 https://exchange.xforce.ibmcloud.com/vulnerabilities/24115 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 3

Multiple SQL injection vulnerabilities in MyBulletinBoard (MyBB) 1.00 RC4 allow remote attackers to execute arbitrary SQL commands via the (1) eid parameter to calendar.php, (2) idsql parameter to online.php, (3) usersearch parameter to memberlist.php, (4) pid parameter to editpost.php, (5) fid parameter to forumdisplay.php, (6) tid parameter to newreply.php, (7) sid parameter to search.php, (8) tid or (9) pid parameter to showthread.php, (10) tid parameter to usercp2.php, (11) tid parameter to printthread.php, or (12) pid parameter to reputation.php. • https://www.exploit-db.com/exploits/1022 http://marc.info/?l=bugtraq&m=111757191118050&w=2 http://secunia.com/advisories/15552 http://www.mybboard.com/community/showthread.php?tid=2559 http://www.osvdb.org/17024 •