How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote web server contains a CGI application that is prone to
cross-site scripting attacks.
The installed version of YaBB (Yet Another Bulletin Board) on the
remote host suffers from a remote cross-site scripting flaw due to its
failure to properly sanitize input passed via the 'username' parameter
and used as part of the 'usersrecentposts' action. By exploiting this
flaw, a remote attacker can cause arbitrary code to be executed in a
user's browser in the context of the affected website, resulting in
the theft of authentication data or other such attacks.
Upgrade to YaBB version 2 RC2 or greater.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 17305 ()
Bugtraq ID: 12756
CVE ID: CVE-2005-0741CVE-2005-0785
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.