Description
Multiple SQL injection vulnerabilities in BroadBoard Instant ASP Message Board allow remote attackers to run arbitrary SQL commands via the (1) keywords parameter to search.asp, (2) handle parameter to profile.asp, (3) txtUserHandle parameter to reg2.asp or (4) txtUserEmail parameter to forgot.asp.
Exploits (2)
References (8)
Core 8
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/11250
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1011419
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17502
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17500
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17498
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109630777608244&w=2
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12658
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17501
Scores
EPSS
0.0234
EPSS Percentile
85.0%
Details
Status
published
Products (1)
broadboard_instant/asp_message_board
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026