cpe:2.3:a:minibb:minibb:2.1:*:*:*:*:*:*:*
bb_func_unsub.php in MiniBB 3.1 before 20141127 uses an incorrect regular expression, which allows remote attackers to conduct SQl injection attacks via the code parameter in an unsubscribe action to index.php.
Max CVSS
7.5
EPSS Score
0.11%
Published
2014-12-31
Updated
2015-01-03
Multiple cross-site scripting (XSS) vulnerabilities in bb_admin.php in MiniBB before 3.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) forum_name, (2) forum_group, (3) forum_icon, or (4) forum_desc parameter. NOTE: the whatus vector is already covered by CVE-2008-2066.
Max CVSS
4.3
EPSS Score
0.62%
Published
2013-07-31
Updated
2013-07-31
Multiple SQL injection vulnerabilities in (1) setup_mysql.php and (2) setup_options.php in miniBB 2.2 and possibly earlier, when register_globals is enabled, allow remote attackers to execute arbitrary SQL commands via the xtr parameter in a userinfo action to index.php.
Max CVSS
6.8
EPSS Score
0.20%
Published
2008-04-30
Updated
2017-09-29
miniBB 2.2, and possibly earlier, when register_globals is enabled, allows remote attackers to obtain the full path via a direct request to the glang parameter in a registernew action to index.php, which leaks the path in an error message.
Max CVSS
4.3
EPSS Score
0.38%
Published
2008-04-30
Updated
2017-09-29
Cross-site scripting (XSS) vulnerability in index.php in miniBB 2.2, and possibly earlier, when register_globals is enabled, allows remote attackers to inject arbitrary web script or HTML via the glang[] parameter in a registernew action.
Max CVSS
4.3
EPSS Score
0.33%
Published
2008-04-30
Updated
2017-09-29
SQL injection vulnerability in bb_func_search.php in miniBB 2.1 allows remote attackers to execute arbitrary SQL commands via the table parameter to index.php.
Max CVSS
7.5
EPSS Score
0.16%
Published
2007-10-30
Updated
2017-09-29
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!