{"api_version":"1","generated_at":"2026-04-23T18:21:34+00:00","cve":"CVE-2007-1292","urls":{"html":"https://cve.report/CVE-2007-1292","api":"https://cve.report/api/cve/CVE-2007-1292.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-1292","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-1292"},"summary":{"title":"CVE-2007-1292","description":"SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter.  NOTE: the vendor states that the attack is feasible only in circumstances \"almost impossible to achieve.\"","state":"PUBLISHED","assigner":"mitre","published_at":"2007-03-07 00:19:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securityfocus.com/bid/22780","name":"http://www.securityfocus.com/bid/22780","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"VBulletin Inlinemod.PHP SQL Injection Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://osvdb.org/33835","name":"http://osvdb.org/33835","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.exploit-db.com/exploits/3387","name":"https://www.exploit-db.com/exploits/3387","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"vBulletin <= 3.6.4 (inlinemod.php postids) Remote SQL Injection Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/24341","name":"http://secunia.com/advisories/24341","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"vBulletin \"postids\" SQL Injection Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32746","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32746","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vbulletin.com/forum/showthread.php?postid=1314422","name":"http://www.vbulletin.com/forum/showthread.php?postid=1314422","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"vBulletin 3.6.5 Released","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-1292","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1292","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"3.6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"1292","vulnerable":"1","versionEndIncluding":"3.5.8","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jelsoft","cpe5":"vbulletin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T12:50:35.050Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"33835","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/33835"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.vbulletin.com/forum/showthread.php?postid=1314422"},{"name":"24341","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24341"},{"name":"vbulletin-inlinemod-sql-injection(32746)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32746"},{"name":"3387","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/3387"},{"name":"22780","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/22780"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2007-02-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter.  NOTE: the vendor states that the attack is feasible only in circumstances \"almost impossible to achieve.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"33835","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/33835"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.vbulletin.com/forum/showthread.php?postid=1314422"},{"name":"24341","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24341"},{"name":"vbulletin-inlinemod-sql-injection(32746)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32746"},{"name":"3387","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/3387"},{"name":"22780","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/22780"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2007-1292","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter.  NOTE: the vendor states that the attack is feasible only in circumstances \"almost impossible to achieve.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"33835","refsource":"OSVDB","url":"http://osvdb.org/33835"},{"name":"http://www.vbulletin.com/forum/showthread.php?postid=1314422","refsource":"CONFIRM","url":"http://www.vbulletin.com/forum/showthread.php?postid=1314422"},{"name":"24341","refsource":"SECUNIA","url":"http://secunia.com/advisories/24341"},{"name":"vbulletin-inlinemod-sql-injection(32746)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/32746"},{"name":"3387","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/3387"},{"name":"22780","refsource":"BID","url":"http://www.securityfocus.com/bid/22780"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2007-1292","datePublished":"2007-03-07T00:00:00.000Z","dateReserved":"2007-03-06T00:00:00.000Z","dateUpdated":"2024-08-07T12:50:35.050Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2007-03-07 00:19:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:*:*:*:*:*:*:*:*","versionEndIncluding":"3.5.8","matchCriteriaId":"005A4C1B-AD21-4D45-84DD-0A2F7265EDAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.0:*:*:*:*:*:*:*","matchCriteriaId":"089A26E5-BB0B-4900-8B08-DADB7BD7572C"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"C5A71F01-F789-4C2B-A0F7-E33D0166AB81"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.2:*:*:*:*:*:*:*","matchCriteriaId":"04EAA836-4E63-4B11-BE2B-76A52B4F4B95"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.3:*:*:*:*:*:*:*","matchCriteriaId":"E0B4231D-1A82-49EC-ACFD-5C35DB8A34CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.4:*:*:*:*:*:*:*","matchCriteriaId":"AE1916A8-E22B-41F3-AF7C-71D802900FC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:jelsoft:vbulletin:3.6.5:*:*:*:*:*:*:*","matchCriteriaId":"36F87545-C2E6-4EF9-8E64-123C0F612511"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"1292","Ordinal":"1","Title":"CVE-2007-1292","CVE":"CVE-2007-1292","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"1292","Ordinal":"1","NoteData":"SQL injection vulnerability in inlinemod.php in Jelsoft vBulletin before 3.5.8, and before 3.6.5 in the 3.6.x series, might allow remote authenticated users to execute arbitrary SQL commands via the postids parameter.  NOTE: the vendor states that the attack is feasible only in circumstances \"almost impossible to achieve.\"","Type":"Description","Title":"CVE-2007-1292"},{"CveYear":"2007","CveId":"1292","Ordinal":"2","NoteData":"2007-03-06","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"1292","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}