Multiple cross-site scripting (XSS) vulnerabilities in V3 Chat allow remote attackers to inject arbitrary web script or HTML via crafted HTML tags, as demonstrated by the IMG tag, in the (1) id parameter in (a) mail/index.php and (b) mail/reply.php; (2) login_id parameter in (c) members/is_online.php; (3) site_id parameter in (d) messenger/online.php, (e) messenger/search.php, and (f) messenger/profile.php; (4) contact_name parameter in messenger/search.php; (5) membername parameter in (g) messenger/profileview.php; (6) unspecified parameters used when "editing a profile"; and (7) cust_name parameter in (h) messenger/expire.php. NOTE: The vendor disputes the vectors involving files in the messenger directory, stating "... the referenced folder 'messenger' was never available to the general public...".
References
Configurations
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://securitytracker.com/id?1016340 - Exploit | |
References | () http://www.securityfocus.com/archive/1/437755/100/200/threaded - | |
References | () http://www.securityfocus.com/archive/1/438069/100/200/threaded - | |
References | () http://www.securityfocus.com/bid/18543 - | |
References | () http://www.vupen.com/english/advisories/2006/2474 - |
Information
Published : 2006-07-06 20:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3366
Mitre link : CVE-2006-3366
CVE.ORG link : CVE-2006-3366
JSON object : View
Products Affected
v3_chat
- v3_chat
CWE