Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in weblog.pl in PerlBlog 1.09b and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) email parameters.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perlblog | Perlblog | 1.08 |
References
- http://evuln.com/vulns/81/summary.htmlVendor Advisory
- http://secunia.com/advisories/18924
- http://securityreason.com/securityalert/508
- http://www.securityfocus.com/archive/1/426260/100/0/threaded
- http://www.securityfocus.com/bid/16707
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24691
- http://evuln.com/vulns/81/summary.htmlVendor Advisory
- http://secunia.com/advisories/18924
- http://securityreason.com/securityalert/508
- http://www.securityfocus.com/archive/1/426260/100/0/threaded
- http://www.securityfocus.com/bid/16707
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24691
FAQ
What is CVE-2006-0780?
CVE-2006-0780 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in weblog.pl in PerlBlog 1.09b and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) email parameters.
How severe is CVE-2006-0780?
CVE-2006-0780 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0780?
Check the references section above for vendor advisories and patch information. Affected products include: Perlblog Perlblog.