source: https://www.securityfocus.com/bid/14762/info MyBulletinBoard is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. misc.php :- http://www.example.com/misc.php?action=rules&fid=-1' [SQL] newreply.php :- One may inject SQL data by submitting a HTTP POST with a modification of the http header as follows: Content-Disposition: form-data; name="icon"\r\n \r\n -1') [SQL] /*\r\n