Description
Multiple cross-site scripting (XSS) vulnerabilities in textfileBB 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) mess and (2) user parameters in messanger.php, possibly requiring a URL encoded value.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/17029
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/0897
URL Repurposed x_refsource_misc
http://notlegal.ws/textfilebbmessanger.txt
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/427081/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/25091
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015744
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19149
Scores
EPSS
0.0086
EPSS Percentile
75.2%
Details
Status
published
Products (1)
jcink.com/textfilebb
1.0
Published
Mar 14, 2006
Tracked Since
Feb 18, 2026