CVE-2006-0806

Multiple cross-site scripting (XSS) vulnerabilities in ADOdb 4.71, as used in multiple packages such as phpESP, allow remote attackers to inject arbitrary web script or HTML via (1) the next_page parameter in adodb-pager.inc.php and (2) other unspecified vectors related to PHP_SELF.
References
Link Resource
http://phpesp.cvs.sourceforge.net/phpesp/phpESP/admin/include/lib/adodb/adodb-pager.inc.php?r1=1.1&r2=1.2
http://secunia.com/advisories/18928 Vendor Advisory
http://secunia.com/advisories/19555 Vendor Advisory
http://secunia.com/advisories/19590 Vendor Advisory
http://secunia.com/advisories/19591 Vendor Advisory
http://secunia.com/advisories/19691 Vendor Advisory
http://securityreason.com/securityalert/452
http://sourceforge.net/project/shownotes.php?release_id=419843&group_id=8956
http://www.debian.org/security/2006/dsa-1029
http://www.debian.org/security/2006/dsa-1030
http://www.debian.org/security/2006/dsa-1031
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
http://www.gulftech.org/?node=research&article_id=00101-02182006
http://www.osvdb.org/23362
http://www.securityfocus.com/archive/1/425393/100/0/threaded
http://www.securityfocus.com/bid/16720
http://www.vupen.com/english/advisories/2006/0664 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2021 Vendor Advisory
http://phpesp.cvs.sourceforge.net/phpesp/phpESP/admin/include/lib/adodb/adodb-pager.inc.php?r1=1.1&r2=1.2
http://secunia.com/advisories/18928 Vendor Advisory
http://secunia.com/advisories/19555 Vendor Advisory
http://secunia.com/advisories/19590 Vendor Advisory
http://secunia.com/advisories/19591 Vendor Advisory
http://secunia.com/advisories/19691 Vendor Advisory
http://securityreason.com/securityalert/452
http://sourceforge.net/project/shownotes.php?release_id=419843&group_id=8956
http://www.debian.org/security/2006/dsa-1029
http://www.debian.org/security/2006/dsa-1030
http://www.debian.org/security/2006/dsa-1031
http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml
http://www.gulftech.org/?node=research&article_id=00101-02182006
http://www.osvdb.org/23362
http://www.securityfocus.com/archive/1/425393/100/0/threaded
http://www.securityfocus.com/bid/16720
http://www.vupen.com/english/advisories/2006/0664 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2021 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:john_lim:adodb:4.66:*:*:*:*:*:*:*
cpe:2.3:a:john_lim:adodb:4.68:*:*:*:*:*:*:*
cpe:2.3:a:john_lim:adodb:4.70:*:*:*:*:*:*:*
cpe:2.3:a:john_lim:adodb:4.71:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://phpesp.cvs.sourceforge.net/phpesp/phpESP/admin/include/lib/adodb/adodb-pager.inc.php?r1=1.1&r2=1.2 - () http://phpesp.cvs.sourceforge.net/phpesp/phpESP/admin/include/lib/adodb/adodb-pager.inc.php?r1=1.1&r2=1.2 -
References () http://secunia.com/advisories/18928 - Vendor Advisory () http://secunia.com/advisories/18928 - Vendor Advisory
References () http://secunia.com/advisories/19555 - Vendor Advisory () http://secunia.com/advisories/19555 - Vendor Advisory
References () http://secunia.com/advisories/19590 - Vendor Advisory () http://secunia.com/advisories/19590 - Vendor Advisory
References () http://secunia.com/advisories/19591 - Vendor Advisory () http://secunia.com/advisories/19591 - Vendor Advisory
References () http://secunia.com/advisories/19691 - Vendor Advisory () http://secunia.com/advisories/19691 - Vendor Advisory
References () http://securityreason.com/securityalert/452 - () http://securityreason.com/securityalert/452 -
References () http://sourceforge.net/project/shownotes.php?release_id=419843&group_id=8956 - () http://sourceforge.net/project/shownotes.php?release_id=419843&group_id=8956 -
References () http://www.debian.org/security/2006/dsa-1029 - () http://www.debian.org/security/2006/dsa-1029 -
References () http://www.debian.org/security/2006/dsa-1030 - () http://www.debian.org/security/2006/dsa-1030 -
References () http://www.debian.org/security/2006/dsa-1031 - () http://www.debian.org/security/2006/dsa-1031 -
References () http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml - () http://www.gentoo.org/security/en/glsa/glsa-200604-07.xml -
References () http://www.gulftech.org/?node=research&article_id=00101-02182006 - () http://www.gulftech.org/?node=research&article_id=00101-02182006 -
References () http://www.osvdb.org/23362 - () http://www.osvdb.org/23362 -
References () http://www.securityfocus.com/archive/1/425393/100/0/threaded - () http://www.securityfocus.com/archive/1/425393/100/0/threaded -
References () http://www.securityfocus.com/bid/16720 - () http://www.securityfocus.com/bid/16720 -
References () http://www.vupen.com/english/advisories/2006/0664 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0664 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2021 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2021 - Vendor Advisory

Information

Published : 2006-02-21 02:02

Updated : 2024-11-21 00:07


NVD link : CVE-2006-0806

Mitre link : CVE-2006-0806

CVE.ORG link : CVE-2006-0806


JSON object : View

Products Affected

john_lim

  • adodb
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')