Filtered by vendor Yabb
Subscribe
Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2007-3295 | 1 Yabb | 1 Yabb | 2025-04-09 | 6.5 MEDIUM | N/A |
Directory traversal vulnerability in Yet another Bulletin Board (YaBB) 2.1 and earlier allows remote authenticated users to execute arbitrary Perl code via a .. (dot dot) in the userlanguage profile setting, which sets the userlanguage key of the member hash, and is propagated to the language variable in (1) HelpCentre.pl and (2) ICQPager.pl, (3) the use_lang variable in Subs.pl, and the actlang variable in (4) Post.pl and (5) InstantMessage.pl; as demonstrated by pointing userlanguage to the English folder, modifying English/HelpCentre.lng file to contain Perl statements, and then invoking the help action in YaBB.pl. | |||||
CVE-2007-3208 | 1 Yabb | 1 Yabb | 2025-04-09 | 10.0 HIGH | N/A |
CRLF injection vulnerability in Yet another Bulletin Board (YaBB) 2.1 allows remote attackers to obtain administrative access via requests to (1) register.pl or (2) profile.pl that write CRLF sequences to a .vars file. NOTE: this can be leveraged to execute arbitrary code. | |||||
CVE-2004-2139 | 1 Yabb | 1 Yabb | 2025-04-03 | 7.5 HIGH | N/A |
Unknown vulnerability in Adminedit.pl YaBB 1 Gold before 1.3.2 allows attackers to execute arbitrary code via settings.pl. | |||||
CVE-2000-1176 | 1 Yabb | 1 Yabb | 2025-04-03 | 7.5 HIGH | N/A |
Directory traversal vulnerability in YaBB search.pl CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack in the "catsearch" form field. | |||||
CVE-2004-0344 | 1 Yabb | 1 Yabb | 2025-04-03 | 6.4 MEDIUM | N/A |
Directory traversal vulnerability in ModifyMessage.php in YaBB SE 1.5.4 through 1.5.5b allows remote attackers to delete arbitrary files via a .. (dot dot) in the attachOld parameter. | |||||
CVE-2005-0741 | 1 Yabb | 1 Yabb | 2025-04-03 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in YaBB.pl for YaBB 2.0 RC1 allows remote attackers to inject arbitrary web script or HTML via the username parameter in a usersrecentposts action. | |||||
CVE-2006-3275 | 1 Yabb | 1 Yabb | 2025-04-03 | 7.5 HIGH | N/A |
SQL injection vulnerability in profile.php in YaBB SE 1.5.5 and earlier allows remote attackers to execute SQL commands via a double-encoded user parameter in a viewprofile action. | |||||
CVE-2004-0343 | 1 Yabb | 1 Yabb | 2025-04-03 | 10.0 HIGH | N/A |
Multiple SQL injection vulnerabilities in YaBB SE 1.5.4 through 1.5.5b allow remote attackers to execute arbitrary SQL via (1) the msg parameter in ModifyMessage.php or (2) the postid parameter in ModifyMessage.php. | |||||
CVE-2002-2296 | 1 Yabb | 1 Yabb | 2025-04-03 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in YaBB.pl in Yet Another Bulletin Board (YaBB) 1 Gold SP 1 allows remote attackers to inject arbitrary web script or HTML via the num parameter. | |||||
CVE-2004-1982 | 1 Yabb | 1 Yabb | 2025-04-03 | 5.0 MEDIUM | N/A |
Post.pl in YaBB 1 Gold SP 1.2 allows remote attackers to modify records in the board's .txt file via carriage return characters in the subject field. | |||||
CVE-2004-1662 | 1 Yabb | 1 Yabb | 2025-04-03 | 5.0 MEDIUM | N/A |
YaBB SE 1.5.1 allows remote attackers to obtain sensitive information via a direct HTTP request to Admin.php, which reveals the full path in a PHP error message. | |||||
CVE-2004-2140 | 1 Yabb | 1 Yabb | 2025-04-03 | 5.0 MEDIUM | N/A |
CRLF injection vulnerability in YaBB 1 Gold before 1.3.2 allows remote attackers to modify text file contents via the subject variable. | |||||
CVE-2004-0291 | 1 Yabb | 1 Yabb | 2025-04-03 | 5.0 MEDIUM | N/A |
SQL injection vulnerability in post.php for YaBB SE 1.5.4 and 1.5.5 allows remote attackers to obtain hashed passwords via the quote parameter. | |||||
CVE-2004-2754 | 1 Yabb | 1 Yabb Se | 2025-04-03 | 7.5 HIGH | N/A |
SQL injection vulnerability in SSI.php in YaBB SE 1.5.4, 1.5.3, and possibly other versions before 1.5.5 allows remote attackers to execute arbitrary SQL commands via the ID_MEMBER parameter to the (1) recentTopics and (2) welcome functions. | |||||
CVE-2003-1277 | 1 Yabb | 1 Yabb | 2025-04-03 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerabilities in Yet Another Bulletin Board (YaBB) 1.5.0 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via cookies by injecting arbitrary HTML or script into (1) news_icon of news_template.php, and (2) threadid and subject of index.html | |||||
CVE-2004-2403 | 1 Yabb | 1 Yabb | 2025-04-03 | 10.0 HIGH | N/A |
Cross-site request forgery (CSRF) vulnerability in YaBB 1 GOLD SP 1.3.2 allows remote attackers to perform unauthorized actions as the administrative user via a link or IMG tag to YaBB.pl that specifies the desired action, id, and moda parameters. | |||||
CVE-2002-0955 | 1 Yabb | 1 Yabb | 2025-04-03 | 7.5 HIGH | N/A |
Cross-site scripting vulnerability in YaBB.cgi for Yet Another Bulletin Board (YaBB) 1 Gold SP1 and earlier allows remote attackers to execute arbitrary script as other web site visitors via script in the num parameter, which is not filtered in the resulting error message. | |||||
CVE-2005-2296 | 1 Yabb | 1 Yabb | 2025-04-03 | 5.0 MEDIUM | N/A |
YabbSE 1.5.5c allows remote attackers to obtain sensitive information via a direct request to ssi_examples.php, which reveals the path. | |||||
CVE-2005-4426 | 1 Yabb | 1 Yabb | 2025-04-03 | 4.0 MEDIUM | N/A |
Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB. | |||||
CVE-2005-0785 | 1 Yabb | 1 Yabb | 2025-04-03 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in usersrecentposts in YaBB 2.0 rc1 allows remote attackers to inject arbitrary web script or HTML via the username parameter. |