Cross-site scripting (XSS) vulnerability in Pixelpost 1.5 beta 1 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) message, (2) name, (3) url, and (4) email parameters when commenting on a post. NOTE: the vendor has disputed some issues from the original disclosure, but due to the vagueness of the dispute, it is not clear whether the vendor is disputing this particular issue.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://forum.pixelpost.org/showthread.php?t=3535 - | |
References | () http://www.neosecurityteam.net/index.php?action=advisories&id=19 - | |
References | () http://www.securityfocus.com/archive/1/426764/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16964 - | |
References | () http://www.vupen.com/english/advisories/2006/0823 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25047 - |
Information
Published : 2006-03-09 13:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1106
Mitre link : CVE-2006-1106
CVE.ORG link : CVE-2006-1106
JSON object : View
Products Affected
pixelpost
- pixelpost
CWE