CVE-2006-0735

Cross-site scripting (XSS) vulnerability in BBcode.pm in M. Blom HTML::BBCode 1.04 and earlier, as used in products such as My Blog before 1.65, allows remote attackers to inject arbitrary Javascript via a javascript URI in an (1) img or (2) url BBcode tag.
References
Link Resource
http://evuln.com/vulns/79/summary.html Exploit Patch Vendor Advisory
http://evuln.com/vulns/80/summary.html Exploit Patch Vendor Advisory
http://fuzzymonkey.net/forum/viewtopic.php?t=856 Patch
http://menno.b10m.net/perl/HTML-BBCode/Changes
http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz
http://secunia.com/advisories/18905 Patch Vendor Advisory
http://secunia.com/advisories/18925 Vendor Advisory
http://www.evuln.com/vulns/80/summary.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/archive/1/425087/100/0/threaded
http://www.securityfocus.com/archive/1/425113/100/0/threaded
http://www.securityfocus.com/bid/16659 Exploit Patch
http://www.vupen.com/english/advisories/2006/0614
http://www.vupen.com/english/advisories/2006/0642
https://exchange.xforce.ibmcloud.com/vulnerabilities/24668
http://evuln.com/vulns/79/summary.html Exploit Patch Vendor Advisory
http://evuln.com/vulns/80/summary.html Exploit Patch Vendor Advisory
http://fuzzymonkey.net/forum/viewtopic.php?t=856 Patch
http://menno.b10m.net/perl/HTML-BBCode/Changes
http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz
http://secunia.com/advisories/18905 Patch Vendor Advisory
http://secunia.com/advisories/18925 Vendor Advisory
http://www.evuln.com/vulns/80/summary.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/archive/1/425087/100/0/threaded
http://www.securityfocus.com/archive/1/425113/100/0/threaded
http://www.securityfocus.com/bid/16659 Exploit Patch
http://www.vupen.com/english/advisories/2006/0614
http://www.vupen.com/english/advisories/2006/0642
https://exchange.xforce.ibmcloud.com/vulnerabilities/24668
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fuzzymonkey:my_blog:1.0:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.2:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.3:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.4:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.5:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.6:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.21:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.22:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.23:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.31:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.51:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.52:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.61:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.62:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.63:*:*:*:*:*:*:*
cpe:2.3:a:fuzzymonkey:my_blog:1.64:*:*:*:*:*:*:*
cpe:2.3:a:m_blom:html-bbcode:1.03:*:*:*:*:*:*:*
cpe:2.3:a:m_blom:html-bbcode:1.04:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://evuln.com/vulns/79/summary.html - Exploit, Patch, Vendor Advisory () http://evuln.com/vulns/79/summary.html - Exploit, Patch, Vendor Advisory
References () http://evuln.com/vulns/80/summary.html - Exploit, Patch, Vendor Advisory () http://evuln.com/vulns/80/summary.html - Exploit, Patch, Vendor Advisory
References () http://fuzzymonkey.net/forum/viewtopic.php?t=856 - Patch () http://fuzzymonkey.net/forum/viewtopic.php?t=856 - Patch
References () http://menno.b10m.net/perl/HTML-BBCode/Changes - () http://menno.b10m.net/perl/HTML-BBCode/Changes -
References () http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz - () http://menno.b10m.net/perl/dists/HTML-BBCode-1.05.tar.gz -
References () http://secunia.com/advisories/18905 - Patch, Vendor Advisory () http://secunia.com/advisories/18905 - Patch, Vendor Advisory
References () http://secunia.com/advisories/18925 - Vendor Advisory () http://secunia.com/advisories/18925 - Vendor Advisory
References () http://www.evuln.com/vulns/80/summary.html - Exploit, Patch, Vendor Advisory () http://www.evuln.com/vulns/80/summary.html - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/425087/100/0/threaded - () http://www.securityfocus.com/archive/1/425087/100/0/threaded -
References () http://www.securityfocus.com/archive/1/425113/100/0/threaded - () http://www.securityfocus.com/archive/1/425113/100/0/threaded -
References () http://www.securityfocus.com/bid/16659 - Exploit, Patch () http://www.securityfocus.com/bid/16659 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2006/0614 - () http://www.vupen.com/english/advisories/2006/0614 -
References () http://www.vupen.com/english/advisories/2006/0642 - () http://www.vupen.com/english/advisories/2006/0642 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24668 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24668 -

Information

Published : 2006-02-16 11:02

Updated : 2025-04-03 01:03


NVD link : CVE-2006-0735

Mitre link : CVE-2006-0735

CVE.ORG link : CVE-2006-0735


JSON object : View

Products Affected

m_blom

  • html-bbcode

fuzzymonkey

  • my_blog