Description
Multiple cross-site scripting (XSS) vulnerabilities in Yblog allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter in (a) funk.php, or the (2) action parameter in (b) tem.php and (c) uss.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by You_You · textwebappsphp
https://www.exploit-db.com/exploits/28733
exploitdb
WORKING POC
VERIFIED
by You_You · textwebappsphp
https://www.exploit-db.com/exploits/28732
References (5)
Core 5
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/1679
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/447427/100/0/threaded
Exploit mailing-list
x_refsource_vim
http://www.attrition.org/pipermail/vim/2006-October/001065.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/20280
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/29291
Scores
EPSS
0.0120
EPSS Percentile
79.0%
Details
Status
published
Products (1)
yblog/yblog
Published
Oct 05, 2006
Tracked Since
Feb 18, 2026