Description
Multiple SQL injection vulnerabilities in PunBB 1.2.1 allow remote attackers to execute arbitrary SQL commands via the (1) language parameter to register.php, (2) change email feature in profile.php, (3) posts or (4) topics parameter to moderate.php.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by John Gumbel · textwebappsphp
https://www.exploit-db.com/exploits/25160
References (6)
Core 6
Core References
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14538
Various Sources x_refsource_confirm
http://www.punbb.org/changelogs/1.2.1_to_1.2.2.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19473
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/12652
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/14394
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=110927754230666&w=2
Scores
EPSS
0.0223
EPSS Percentile
84.7%
Details
Status
published
Products (1)
punbb/punbb
1.2.1
Published
May 02, 2005
Tracked Since
Feb 18, 2026