Vulnerability Description
Cross-site scripting (XSS) vulnerability in the Contributed Packages for PyBlosxom 1.2.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the Comments plugin in the (1) url and (2) author fields.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyblosxom | Pyblosxom | <= 1.2.2 |
References
- http://secunia.com/advisories/20436PatchVendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=422015Patch
- http://www.securityfocus.com/bid/18292
- http://www.vupen.com/english/advisories/2006/2153
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26945
- http://secunia.com/advisories/20436PatchVendor Advisory
- http://sourceforge.net/project/shownotes.php?release_id=422015Patch
- http://www.securityfocus.com/bid/18292
- http://www.vupen.com/english/advisories/2006/2153
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26945
FAQ
What is CVE-2006-2880?
CVE-2006-2880 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Cross-site scripting (XSS) vulnerability in the Contributed Packages for PyBlosxom 1.2.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the Comments plugin in the (1) u...
How severe is CVE-2006-2880?
CVE-2006-2880 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2880?
Check the references section above for vendor advisories and patch information. Affected products include: Pyblosxom Pyblosxom.