CVE-2004-2085

Multiple cross-site scripting (XSS) vulnerabilities in Brad Fears phpCodeCabinet 0.4 and earlier allow remote attackers to inject arbitrary web script or HTML via multiple parameters, including (1) the sid parameter to comments.php, (2) the cid, cf, or rfd parameters to category.php, or the cid parameter to (3) input.php, (4) browse.php, (5) themes/facade/header.php, or (6) themes/phpcc/header.php.
References
Link Resource
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5 Vendor Advisory
http://secunia.com/advisories/10862
http://securitytracker.com/id?1009012
http://sourceforge.net/project/shownotes.php?release_id=214860 Vendor Advisory
http://www.osvdb.org/16710
http://www.osvdb.org/16711
http://www.osvdb.org/3885 Vendor Advisory
http://www.osvdb.org/3886 Patch Vendor Advisory
http://www.osvdb.org/3887 Patch Vendor Advisory
http://www.securityfocus.com/bid/9601 Patch Vendor Advisory
http://www.securityfocus.com/bid/9645 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15190
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5 Vendor Advisory
http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5 Vendor Advisory
http://secunia.com/advisories/10862
http://securitytracker.com/id?1009012
http://sourceforge.net/project/shownotes.php?release_id=214860 Vendor Advisory
http://www.osvdb.org/16710
http://www.osvdb.org/16711
http://www.osvdb.org/3885 Vendor Advisory
http://www.osvdb.org/3886 Patch Vendor Advisory
http://www.osvdb.org/3887 Patch Vendor Advisory
http://www.securityfocus.com/bid/9601 Patch Vendor Advisory
http://www.securityfocus.com/bid/9645 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/15190
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:brad_fears:phpcodecabinet:0.1:*:*:*:*:*:*:*
cpe:2.3:a:brad_fears:phpcodecabinet:0.2:*:*:*:*:*:*:*
cpe:2.3:a:brad_fears:phpcodecabinet:0.3:*:*:*:*:*:*:*
cpe:2.3:a:brad_fears:phpcodecabinet:0.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:52

Type Values Removed Values Added
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/browse.php?r1=1.5&r2=1.6 - Vendor Advisory
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/category.php?r1=1.4&r2=1.5 - Vendor Advisory
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/comments.php?r1=1.1&r2=1.2 - Vendor Advisory
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/input.php?r1=1.7&r2=1.8 - Vendor Advisory
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/facade/header.php?r1=1.4&r2=1.5 - Vendor Advisory
References () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5 - Vendor Advisory () http://cvs.sourceforge.net/viewcvs.py/phpcodecabinet/phpcc/themes/phpcc/header.php?r1=1.4&r2=1.5 - Vendor Advisory
References () http://secunia.com/advisories/10862 - () http://secunia.com/advisories/10862 -
References () http://securitytracker.com/id?1009012 - () http://securitytracker.com/id?1009012 -
References () http://sourceforge.net/project/shownotes.php?release_id=214860 - Vendor Advisory () http://sourceforge.net/project/shownotes.php?release_id=214860 - Vendor Advisory
References () http://www.osvdb.org/16710 - () http://www.osvdb.org/16710 -
References () http://www.osvdb.org/16711 - () http://www.osvdb.org/16711 -
References () http://www.osvdb.org/3885 - Vendor Advisory () http://www.osvdb.org/3885 - Vendor Advisory
References () http://www.osvdb.org/3886 - Patch, Vendor Advisory () http://www.osvdb.org/3886 - Patch, Vendor Advisory
References () http://www.osvdb.org/3887 - Patch, Vendor Advisory () http://www.osvdb.org/3887 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/9601 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/9601 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/9645 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/9645 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15190 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15190 -

Information

Published : 2004-02-04 05:00

Updated : 2024-11-20 23:52


NVD link : CVE-2004-2085

Mitre link : CVE-2004-2085

CVE.ORG link : CVE-2004-2085


JSON object : View

Products Affected

brad_fears

  • phpcodecabinet