Multiple SQL injection vulnerabilities in PBBoard 2.1.4 allow remote attackers to execute arbitrary SQL commands via the (1) username parameter to the send page, (2) email parameter to the forget page, (3) password parameter to the forum_archive page, (4) section parameter to the management page, (5) section_id parameter to the managementreply page, (6) member_id parameter to the new_password page, or (7) subjectid parameter to the tags page to index.php.
References
Link | Resource |
---|---|
http://osvdb.org/84480 | |
http://secunia.com/advisories/50153 | Vendor Advisory |
http://www.pbboard.com/forums/t10352.html | URL Repurposed |
http://www.pbboard.com/forums/t10353.html | Vendor Advisory URL Repurposed |
http://www.securityfocus.com/bid/54916 | Exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77501 | |
https://www.htbridge.com/advisory/HTB23101 | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2012-08-12T00:00:00
Updated: 2017-08-28T12:57:01
Reserved: 2012-07-20T00:00:00
Link: CVE-2012-4034
JSON object: View
NVD Information
Status : Modified
Published: 2012-08-12T00:55:01.027
Modified: 2024-02-14T01:17:43.863
Link: CVE-2012-4034
JSON object: View
Redhat Information
No data.
CWE