Description
Multiple cross-site scripting (XSS) vulnerabilities in vBulletin before 3.0.9 allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter to css.php, (2) redirect parameter to index.php, (3) email parameter to user.php, (4) goto parameter to language.php, (5) orderby parameter to modlog.php, and the (6) hex, (7) rgb, or (8) expandset parameter to template.php.
Exploits (6)
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26280
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26283
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26282
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26281
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26279
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26278
References (5)
Core 5
Core References
Exploit, Patch, Vendor Advisory x_refsource_misc
http://morph3us.org/advisories/20050917-vbulletin-3.0.8.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22324
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14874
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112715150320677&w=2
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/16873/
Scores
EPSS
0.0051
EPSS Percentile
66.6%
Details
Status
published
Products (35)
jelsoft/vbulletin
1.0.1
jelsoft/vbulletin
2.0.3
jelsoft/vbulletin
2.0_rc2
jelsoft/vbulletin
2.0_rc3
jelsoft/vbulletin
2.2.0
jelsoft/vbulletin
2.2.1
jelsoft/vbulletin
2.2.2
jelsoft/vbulletin
2.2.3
jelsoft/vbulletin
2.2.4
jelsoft/vbulletin
2.2.5
... and 25 more
Published
Sep 21, 2005
Tracked Since
Feb 18, 2026