Page 9 of 63 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in moderation.php in MyBB (aka MyBulletinBoard) 1.0.3 allows remote authenticated users, with certain privileges for moderating and merging posts, to execute arbitrary SQL commands via the posts parameter. • http://myimei.com/security/2006-02-07/mybb103moderationphpsqlinject-while-merging-posts.html http://secunia.com/advisories/18754 http://www.osvdb.org/22957 http://www.securityfocus.com/archive/1/424335/100/0/threaded http://www.securityfocus.com/bid/16538 http://www.vupen.com/english/advisories/2006/0475 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

SQL injection vulnerability in global.php in MyBB before 1.03 allows remote attackers to execute arbitrary SQL commands via the templatelist variable. • http://community.mybboard.net/showthread.php?tid=6418 http://secunia.com/advisories/18678 http://www.osvdb.org/22903 http://www.vupen.com/english/advisories/2006/0400 https://exchange.xforce.ibmcloud.com/vulnerabilities/24416 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Add Thread to Favorites feature in usercp2.php in MyBB (aka MyBulletinBoard) 1.02 allows remote attackers to inject arbitrary web script or HTML via an HTTP Referer header ($url variable). • http://www.securityfocus.com/archive/1/423443/100/0/threaded http://www.securityfocus.com/bid/16419 https://exchange.xforce.ibmcloud.com/vulnerabilities/24392 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in MyBB (aka MyBulletinBoard) 1.02 allows local users with MyBB administrative privileges to include and possibly execute arbitrary local files via directory traversal sequences and a nul (%00) character in the plugin parameter. • http://www.securityfocus.com/archive/1/423465/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/24461 •

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

Cross-site scripting (XSS) vulnerability in search.php in MyBulletinBoard (MyBB) 1.02 allows remote attackers to inject arbitrary web script or HTML via the (1) sortby and (2) sortordr parameters, which are not properly handled in a redirection. • https://www.exploit-db.com/exploits/27137 http://community.mybboard.net/attachment.php?aid=2181 http://community.mybboard.net/showthread.php?tid=6418 http://seclists.org/lists/bugtraq/2006/Jan/0414.html http://secunia.com/advisories/18617 http://securityreason.com/securityalert/374 http://www.osvdb.org/22750 http://www.securityfocus.com/bid/16387 http://www.vupen.com/english/advisories/2006/0350 https://exchange.xforce.ibmcloud.com/vulnerabilities/24466 •