Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21881 | A vulnerability, which was classified as problematic, has been found in Gnuboard g6 up to 6.0.10. This issue affects some unknown processing of the file /bbs/scrap_popin_update/qa/ of the component Post Reply Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. |
Thu, 04 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sir
Sir gnuboard |
|
| CPEs | cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Sir
Sir gnuboard |
Fri, 18 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 18 Jul 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as problematic, has been found in Gnuboard g6 up to 6.0.10. This issue affects some unknown processing of the file /bbs/scrap_popin_update/qa/ of the component Post Reply Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Gnuboard g6 Post Reply qa cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-07-18T13:39:57.109Z
Reserved: 2025-07-18T07:24:31.416Z
Link: CVE-2025-7786
Updated: 2025-07-18T13:39:43.758Z
Status : Analyzed
Published: 2025-07-18T14:15:27.270
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-7786
No data.
OpenCVE Enrichment
No data.
EUVD