Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB.
Software | From | Fixed in |
---|---|---|
yabb / yabb | 1_gold_-_sp_1 | 1_gold_-_sp_1.x |
yabb / yabb | 1_gold_-_sp_1.2 | 1_gold_-_sp_1.2.x |
yabb / yabb | 1_gold_-_sp_1.3 | 1_gold_-_sp_1.3.x |
yabb / yabb | 1_gold_-_sp_1.3.1 | 1_gold_-_sp_1.3.1.x |
yabb / yabb | 1_gold_-_sp_1.3.2 | 1_gold_-_sp_1.3.2.x |
yabb / yabb | 1_gold_-_sp_1.4 | 1_gold_-_sp_1.4.x |
yabb / yabb | 1_gold_release | 1_gold_release.x |
yabb / yabb | 1.40 | 1.40.x |
yabb / yabb | 1.41 | 1.41.x |
yabb / yabb | 2.0 | 2.0.x |
yabb / yabb | 2.0_rc1 | 2.0_rc1.x |
yabb / yabb | 2.0_rc2 | 2.0_rc2.x |