Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2005-4426


Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB.


Published

2005-12-20T11:03:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application yabb yabb 1.40 Yes
Application yabb yabb 1.41 Yes
Application yabb yabb 1_gold_-_sp_1 Yes
Application yabb yabb 1_gold_-_sp_1.2 Yes
Application yabb yabb 1_gold_-_sp_1.3 Yes
Application yabb yabb 1_gold_-_sp_1.3.1 Yes
Application yabb yabb 1_gold_-_sp_1.3.2 Yes
Application yabb yabb 1_gold_-_sp_1.4 Yes
Application yabb yabb 1_gold_release Yes
Application yabb yabb 2.0 Yes
Application yabb yabb 2.0_rc1 Yes
Application yabb yabb 2.0_rc2 Yes

References