CVE-2007-6298
https://notcve.org/view.php?id=CVE-2007-6298
Cross-site scripting (XSS) vulnerability in the Shoutbox module for Drupal 5.x before Shoutbox 5.x-1.1 allows remote authenticated users to inject arbitrary web script or HTML via Shoutbox block messages. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo Shoutbox para Drupal 5.x versiones anteriores a Shoutbox 5.x-1.1 permite a usuarios remotos autenticados inyectar scripts web o HTML de su elección mediante mensajes de bloque Shoutbox. • http://drupal.org/node/198163 http://osvdb.org/39053 http://secunia.com/advisories/27953 http://www.securityfocus.com/bid/26736 https://exchange.xforce.ibmcloud.com/vulnerabilities/38885 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2006-6721 – Knusperleicht Shoutbox 2.6 - 'Shout.php' HTML Injection
https://notcve.org/view.php?id=CVE-2006-6721
Multiple cross-site scripting (XSS) vulnerabilities in shout.php in Knusperleicht ShoutBox 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) sbNick or (2) sbKommentar parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en shout.php de Knusperleicht ShoutBox 2.6 permiten a un atacante remoto inyectar secuencias de comandos web o HTML mediante los parámetros (1) sbNick o (2) sbKommentar. • https://www.exploit-db.com/exploits/29294 http://secunia.com/advisories/23526 http://www.securityfocus.com/bid/21637 http://www.securityfocus.com/data/vulnerabilities/exploits/21637.html •
CVE-2006-3989 – k_shoutbox 4.4 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-3989
PHP remote file inclusion vulnerability in index.php in Knusperleicht Shoutbox 4.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the sb_include_path parameter. Vulnerabilidad PHP de inclusión remota de archivo en index.php en Knusperleicht Shoutbox 4.4 y anteriores permiten a atacantes remotos ejecutar código PHP de su elección a través de una URL en el parámetro sb_include_path. • https://www.exploit-db.com/exploits/2103 http://secunia.com/advisories/21302 http://securityreason.com/securityalert/1325 http://www.osvdb.org/27709 http://www.securityfocus.com/archive/1/441815/100/0/threaded http://www.securityfocus.com/bid/19273 http://www.vupen.com/english/advisories/2006/3090 https://exchange.xforce.ibmcloud.com/vulnerabilities/28123 •