source: http://www.securityfocus.com/bid/7405/info It has been reported that OpenBB does not properly check input passed via the 'member.php' script. Because of this, an attacker may be able to inject arbitrary commands to the database in the context of the bulletin board software. The consequences will vary depending on the underlying database implementation. http://www.example.com/member.php?action=profile&UID=1%20<something> where <something> represents a SQL query.
Related ExploitsTrying to match OSVDBs (1): 5661
Other Possible E-DB Search Terms: OpenBB 1.0/1.1, OpenBB