source: http://www.securityfocus.com/bid/30777/info
vBulletin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
vBulletin 3.7.2 Patch Level 1 and vBulletin 3.6.10 Patch Level 3 are vulnerable; other versions may also be affected.
--></script><script>alert(/xss/.source)</script><!--
{"id": "EDB-ID:32285", "hash": "5903d4de0f1a1d00c13cf3cc7fb341fb", "type": "exploitdb", "bulletinFamily": "exploit", "title": "vBulletin 3.6.10/3.7.2 - '$newpmtitle' Parameter Cross-Site Scripting Vulnerability", "description": "vBulletin 3.6.10/3.7.2 '$newpm[title]' Parameter Cross-Site Scripting Vulnerability. CVE-2008-3773. Webapps exploit for php platform", "published": "2008-08-20T00:00:00", "modified": "2008-08-20T00:00:00", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://www.exploit-db.com/exploits/32285/", "reporter": "Core Security", "references": [], "cvelist": ["CVE-2008-3773"], "lastseen": "2016-02-03T16:37:36", "history": [], "viewCount": 1, "enchantments": {"score": {"value": 4.7, "vector": "NONE", "modified": "2016-02-03T16:37:36"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2008-3773"]}], "modified": "2016-02-03T16:37:36"}, "vulnersScore": 4.7}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/32285/", "sourceData": "source: http://www.securityfocus.com/bid/30777/info\r\n\r\nvBulletin is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input.\r\n\r\nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.\r\n\r\nvBulletin 3.7.2 Patch Level 1 and vBulletin 3.6.10 Patch Level 3 are vulnerable; other versions may also be affected. \r\n\r\n--></script><script>alert(/xss/.source)</script><!-- ", "osvdbidlist": ["47591"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"cve": [{"lastseen": "2019-05-29T18:09:27", "bulletinFamily": "NVD", "description": "Cross-site scripting (XSS) vulnerability in vBulletin 3.7.2 PL1 and 3.6.10 PL3, when \"Show New Private Message Notification Pop-Up\" is enabled, allows remote authenticated users to inject arbitrary web script or HTML via a private message subject (aka newpm[title]).", "modified": "2017-08-08T01:32:00", "id": "CVE-2008-3773", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-3773", "published": "2008-08-22T16:41:00", "title": "CVE-2008-3773", "type": "cve", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}