Description
SQL injection vulnerability in post.php for MercuryBoard 1.1.1 allows remote attackers to execute arbitrary SQL commands via a reply post action for index.php with (1) the t parameter or (2) the qu parameter.
Exploits (1)
References (5)
Core 5
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110661795632354&w=2
Various Sources x_refsource_confirm
http://cvs.sunsite.dk/viewcvs.cgi/mercury/func/post.php.diff?r1=1.68&r2=1.70
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1013137
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110797495532358&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19051
Scores
EPSS
0.0141
EPSS Percentile
80.6%
Details
Status
published
Products (1)
mercuryboard/mercuryboard
1.1.1
Published
Apr 27, 2005
Tracked Since
Feb 18, 2026