7.5
CVSSv2

CVE-2005-2989

Published: 20/09/2005 Updated: 08/03/2011
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 775
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple SQL injection vulnerabilities in DeluxeBB 1.0 and 1.0.5 allow remote malicious users to execute arbitrary SQL commands via the (1) tid parameter to topic.php, the uid parameter to (2) misc.php or (3) pm.php, or the fid parameter to (3) forums.php or (4) newpost.php.

Vulnerable Product Search on Vulmon Subscribe to Product

deluxebb deluxebb 1.0

deluxebb deluxebb 1.05

Exploits

source: wwwsecurityfocuscom/bid/14851/info DeluxeBB is prone to multiple SQL injection vulnerabilities These are due to a lack of proper sanitization of user-supplied input before being sent to SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an ...
source: wwwsecurityfocuscom/bid/14851/info DeluxeBB is prone to multiple SQL injection vulnerabilities These are due to a lack of proper sanitization of user-supplied input before being sent to SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attac ...
source: wwwsecurityfocuscom/bid/14851/info DeluxeBB is prone to multiple SQL injection vulnerabilities These are due to a lack of proper sanitization of user-supplied input before being sent to SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an att ...
source: wwwsecurityfocuscom/bid/14851/info DeluxeBB is prone to multiple SQL injection vulnerabilities These are due to a lack of proper sanitization of user-supplied input before being sent to SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an a ...
source: wwwsecurityfocuscom/bid/14851/info DeluxeBB is prone to multiple SQL injection vulnerabilities These are due to a lack of proper sanitization of user-supplied input before being sent to SQL queries Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit ...