CVE-2006-2195

Cross-site scripting (XSS) vulnerability in horde 3 (horde3) before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via (1) templates/problem/problem.inc and (2) test.php.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=136830
http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146
http://cvs.horde.org/diff.php?r1=2.25&r2=2.26&f=horde%2Ftemplates%2Fproblem%2Fproblem.inc
http://overlays.gentoo.org/dev/chtekk/browser/horde/www-apps/horde/files/horde-3.1.1-xss.diff?rev=4&format=txt
http://secunia.com/advisories/20661
http://secunia.com/advisories/20672 Vendor Advisory
http://secunia.com/advisories/20750 Vendor Advisory
http://secunia.com/advisories/20849 Vendor Advisory
http://secunia.com/advisories/20960
http://securitytracker.com/id?1016310
http://www.debian.org/security/2006/dsa-1098 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1099
http://www.gentoo.org/security/en/glsa/glsa-200606-28.xml
http://www.novell.com/linux/security/advisories/2006_16_sr.html
http://www.osvdb.org/26513
http://www.osvdb.org/26514
http://www.securityfocus.com/bid/18436
http://www.vupen.com/english/advisories/2006/2356
https://exchange.xforce.ibmcloud.com/vulnerabilities/27168
http://bugs.gentoo.org/show_bug.cgi?id=136830
http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146
http://cvs.horde.org/diff.php?r1=2.25&r2=2.26&f=horde%2Ftemplates%2Fproblem%2Fproblem.inc
http://overlays.gentoo.org/dev/chtekk/browser/horde/www-apps/horde/files/horde-3.1.1-xss.diff?rev=4&format=txt
http://secunia.com/advisories/20661
http://secunia.com/advisories/20672 Vendor Advisory
http://secunia.com/advisories/20750 Vendor Advisory
http://secunia.com/advisories/20849 Vendor Advisory
http://secunia.com/advisories/20960
http://securitytracker.com/id?1016310
http://www.debian.org/security/2006/dsa-1098 Patch Vendor Advisory
http://www.debian.org/security/2006/dsa-1099
http://www.gentoo.org/security/en/glsa/glsa-200606-28.xml
http://www.novell.com/linux/security/advisories/2006_16_sr.html
http://www.osvdb.org/26513
http://www.osvdb.org/26514
http://www.securityfocus.com/bid/18436
http://www.vupen.com/english/advisories/2006/2356
https://exchange.xforce.ibmcloud.com/vulnerabilities/27168
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:horde:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.4_rc1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.4_rc2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde:3.0.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=136830 - () http://bugs.gentoo.org/show_bug.cgi?id=136830 -
References () http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146 - () http://cvs.horde.org/diff.php?f=horde%2Ftest.php&r1=1.145&r2=1.146 -
References () http://cvs.horde.org/diff.php?r1=2.25&r2=2.26&f=horde%2Ftemplates%2Fproblem%2Fproblem.inc - () http://cvs.horde.org/diff.php?r1=2.25&r2=2.26&f=horde%2Ftemplates%2Fproblem%2Fproblem.inc -
References () http://overlays.gentoo.org/dev/chtekk/browser/horde/www-apps/horde/files/horde-3.1.1-xss.diff?rev=4&format=txt - () http://overlays.gentoo.org/dev/chtekk/browser/horde/www-apps/horde/files/horde-3.1.1-xss.diff?rev=4&format=txt -
References () http://secunia.com/advisories/20661 - () http://secunia.com/advisories/20661 -
References () http://secunia.com/advisories/20672 - Vendor Advisory () http://secunia.com/advisories/20672 - Vendor Advisory
References () http://secunia.com/advisories/20750 - Vendor Advisory () http://secunia.com/advisories/20750 - Vendor Advisory
References () http://secunia.com/advisories/20849 - Vendor Advisory () http://secunia.com/advisories/20849 - Vendor Advisory
References () http://secunia.com/advisories/20960 - () http://secunia.com/advisories/20960 -
References () http://securitytracker.com/id?1016310 - () http://securitytracker.com/id?1016310 -
References () http://www.debian.org/security/2006/dsa-1098 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1098 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1099 - () http://www.debian.org/security/2006/dsa-1099 -
References () http://www.gentoo.org/security/en/glsa/glsa-200606-28.xml - () http://www.gentoo.org/security/en/glsa/glsa-200606-28.xml -
References () http://www.novell.com/linux/security/advisories/2006_16_sr.html - () http://www.novell.com/linux/security/advisories/2006_16_sr.html -
References () http://www.osvdb.org/26513 - () http://www.osvdb.org/26513 -
References () http://www.osvdb.org/26514 - () http://www.osvdb.org/26514 -
References () http://www.securityfocus.com/bid/18436 - () http://www.securityfocus.com/bid/18436 -
References () http://www.vupen.com/english/advisories/2006/2356 - () http://www.vupen.com/english/advisories/2006/2356 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27168 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27168 -

Information

Published : 2006-06-15 10:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2195

Mitre link : CVE-2006-2195

CVE.ORG link : CVE-2006-2195


JSON object : View

Products Affected

horde

  • horde