Multiple cross-site scripting (XSS) vulnerabilities in e107 0.7.5 allow remote attackers to inject arbitrary web script or HTML via the (1) ep parameter to search.php and the (2) subject parameter in comment.php (aka the Subject field when posting a comment).
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20727 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1151 - | |
References | () http://www.securityfocus.com/archive/1/437649/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18508 - | |
References | () http://www.securityfocus.com/bid/18560 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/2460 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27240 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27242 - |
Information
Published : 2006-06-27 21:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3259
Mitre link : CVE-2006-3259
CVE.ORG link : CVE-2006-3259
JSON object : View
Products Affected
e107
- e107
CWE