Multiple cross-site scripting (XSS) vulnerabilities in the "post comment" functionality of WordPress 2.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) website, and (3) comment parameters.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://NeoSecurityTeam.net/advisories/Advisory-17.txt - Exploit, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/19050 - | |
References | () http://www.securityfocus.com/archive/1/426304/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/426504/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/426574/100/0/threaded - | |
References | () http://www.vupen.com/english/advisories/2006/0777 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24957 - |
Information
Published : 2006-03-03 11:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0985
Mitre link : CVE-2006-0985
CVE.ORG link : CVE-2006-0985
JSON object : View
Products Affected
wordpress
- wordpress
CWE