Multiple cross-site scripting (XSS) vulnerabilities in WMNews allow remote attackers to inject arbitrary web script or HTML via the (1) ArtCat parameter to wmview.php, (2) ctrrowcol parameter to footer.php, or (3) ArtID parameter to wmcomments.php.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://biyosecurity.be/bugs/wmnews.txt - Exploit | |
References | () http://secunia.com/advisories/19204 - Vendor Advisory | |
References | () http://www.osvdb.org/23840 - | |
References | () http://www.osvdb.org/23841 - | |
References | () http://www.osvdb.org/23842 - | |
References | () http://www.securityfocus.com/archive/1/427479/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17076 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/0939 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25210 - |
Information
Published : 2006-03-14 19:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1233
Mitre link : CVE-2006-1233
CVE.ORG link : CVE-2006-1233
JSON object : View
Products Affected
mikael_software
- wmnews
CWE