Multiple cross-site scripting (XSS) vulnerabilities in David Bennett PHP-Post (PHPp) 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the replyuser parameter in (a) pm.php; (2) the txt_jumpto parameter in (b) dropdown.php; the (3) txt_error and (4) txt_templatenotexist parameters in (c) template.php; the (5) split parameter in certain files, as demonstrated by (d) editprofile.php, (e) search.php, (f) index.php, and (g) pm.php; and the (6) txt_login parameter in (h) loginline.php; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) txt_logout parameter in (i) loginline.php.
Link | Tags |
---|---|
http://www.osvdb.org/28969 | vdb entry |
http://www.securityfocus.com/bid/20061 | vdb entry |
http://www.vupen.com/english/advisories/2006/3688 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29017 | vdb entry |
http://www.osvdb.org/28972 | vdb entry |
http://www.osvdb.org/28971 | vdb entry |
http://securityreason.com/securityalert/1607 | third party advisory |
http://secunia.com/advisories/22014 | third party advisory |
http://www.securityfocus.com/archive/1/446318/100/0/threaded | mailing list |
http://www.osvdb.org/28968 | vdb entry |
http://www.osvdb.org/28970 | vdb entry |