Multiple cross-site scripting (XSS) vulnerabilities in PHP Live! 3.2.2 allow remote attackers to inject arbitrary web script or HTML via the (1) sid parameter to (a) chat.php, (2) LANG[DEFAULT_BRANDING] and (3) PHPLIVE_VERSION parameters to (b) help.php, the (4) admin[name] parameter to (c) admin/header.php, and the (5) BASE_URL parameter to (d) super/info.php, and in some cases, the LANG[DEFAULT_BRANDING], PHPLIVE_VERSION, and (6) nav_line parameters to setup/footer.php, different vectors than CVE-2006-6769.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://osvdb.org/36986 | vdb-entry x_refsource_OSVDB |
| http://osvdb.org/36989 | vdb-entry x_refsource_OSVDB |
| http://osvdb.org/36987 | vdb-entry x_refsource_OSVDB |
| http://osvdb.org/38383 | vdb-entry x_refsource_OSVDB |
| http://www.vupen.com/english/advisories/2007/2082 | vdb-entry x_refsource_VUPEN |
| http://osvdb.org/36988 | vdb-entry x_refsource_OSVDB |
| http://marc.info/?l=full-disclosure&m=118072121020357&w=2 | mailing-list x_refsource_FULLDISC |
| http://www.securityfocus.com/archive/1/470275 | mailing-list x_refsource_BUGTRAQ |
| http://osvdb.org/38381 | vdb-entry x_refsource_OSVDB |
| http://www.securityfocus.com/bid/24276 | vdb-entry x_refsource_BID |
| http://osvdb.org/38379 | vdb-entry x_refsource_OSVDB |
| http://osvdb.org/38382 | vdb-entry x_refsource_OSVDB |
| http://secunia.com/advisories/25441 | third-party-advisory x_refsource_SECUNIA |
| http://osvdb.org/36990 | vdb-entry x_refsource_OSVDB |
| http://osvdb.org/38380 | vdb-entry x_refsource_OSVDB |
| http://www.securityfocus.com/archive/1/470508/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://osvdb.org/36986 | vdb-entry x_refsource_OSVDB x_transferred |
| http://osvdb.org/36989 | vdb-entry x_refsource_OSVDB x_transferred |
| http://osvdb.org/36987 | vdb-entry x_refsource_OSVDB x_transferred |
| http://osvdb.org/38383 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.vupen.com/english/advisories/2007/2082 | vdb-entry x_refsource_VUPEN x_transferred |
| http://osvdb.org/36988 | vdb-entry x_refsource_OSVDB x_transferred |
| http://marc.info/?l=full-disclosure&m=118072121020357&w=2 | mailing-list x_refsource_FULLDISC x_transferred |
| http://www.securityfocus.com/archive/1/470275 | mailing-list x_refsource_BUGTRAQ x_transferred |
| http://osvdb.org/38381 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.securityfocus.com/bid/24276 | vdb-entry x_refsource_BID x_transferred |
| http://osvdb.org/38379 | vdb-entry x_refsource_OSVDB x_transferred |
| http://osvdb.org/38382 | vdb-entry x_refsource_OSVDB x_transferred |
| http://secunia.com/advisories/25441 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://osvdb.org/36990 | vdb-entry x_refsource_OSVDB x_transferred |
| http://osvdb.org/38380 | vdb-entry x_refsource_OSVDB x_transferred |
| http://www.securityfocus.com/archive/1/470508/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |