Multiple cross-site scripting (XSS) vulnerabilities in PHP Live! 3.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) sid parameter to (a) chat.php, (2) LANG[DEFAULT_BRANDING] and (3) PHPLIVE_VERSION parameters to (b) help.php, the (4) admin[name] parameter to (c) admin/header.php, and the (5) BASE_URL parameter to (d) super/info.php, and in some cases, the LANG[DEFAULT_BRANDING], PHPLIVE_VERSION, and (6) nav_line parameters to setup/footer.php, different vectors than CVE-2006-6769.
Link | Tags |
---|---|
http://osvdb.org/36986 | vdb entry |
http://osvdb.org/36989 | vdb entry |
http://osvdb.org/36987 | vdb entry |
http://osvdb.org/38383 | vdb entry |
http://www.vupen.com/english/advisories/2007/2082 | vdb entry |
http://osvdb.org/36988 | vdb entry |
http://marc.info/?l=full-disclosure&m=118072121020357&w=2 | mailing list exploit |
http://www.securityfocus.com/archive/1/470275 | mailing list |
http://osvdb.org/38381 | vdb entry |
http://www.securityfocus.com/bid/24276 | vdb entry exploit |
http://osvdb.org/38379 | vdb entry |
http://osvdb.org/38382 | vdb entry |
http://secunia.com/advisories/25441 | third party advisory |
http://osvdb.org/36990 | vdb entry |
http://osvdb.org/38380 | vdb entry |
http://www.securityfocus.com/archive/1/470508/100/0/threaded | mailing list |