CVE-2006-4881
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/09/2006
Last modified:
03/04/2025
Description
Multiple cross-site scripting (XSS) vulnerabilities in David Bennett PHP-Post (PHPp) 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the replyuser parameter in (a) pm.php; (2) the txt_jumpto parameter in (b) dropdown.php; the (3) txt_error and (4) txt_templatenotexist parameters in (c) template.php; the (5) split parameter in certain files, as demonstrated by (d) editprofile.php, (e) search.php, (f) index.php, and (g) pm.php; and the (6) txt_login parameter in (h) loginline.php; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) txt_logout parameter in (i) loginline.php.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:david_bennett:php-post:*:*:*:*:*:*:*:* | 1.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/22014
- http://securityreason.com/securityalert/1607
- http://www.osvdb.org/28968
- http://www.osvdb.org/28969
- http://www.osvdb.org/28970
- http://www.osvdb.org/28971
- http://www.osvdb.org/28972
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/bid/20061
- http://www.vupen.com/english/advisories/2006/3688
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29017
- http://secunia.com/advisories/22014
- http://securityreason.com/securityalert/1607
- http://www.osvdb.org/28968
- http://www.osvdb.org/28969
- http://www.osvdb.org/28970
- http://www.osvdb.org/28971
- http://www.osvdb.org/28972
- http://www.securityfocus.com/archive/1/446318/100/0/threaded
- http://www.securityfocus.com/bid/20061
- http://www.vupen.com/english/advisories/2006/3688
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29017



