Interpretation conflict in YaBB before 2.1 allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF file extension, which causes the HTML to be executed by a victim who views the file in Internet Explorer as a result of CVE-2005-3312. NOTE: it could be argued that this vulnerability is due to a design flaw in Internet Explorer and the proper fix should be in that browser; if so, then this should not be treated as a vulnerability in YaBB.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Yabb | Yabb | 1.40 (including) | 1.40 (including) |
Yabb | Yabb | 1.41 (including) | 1.41 (including) |
Yabb | Yabb | 1_gold_-_sp_1 (including) | 1_gold_-_sp_1 (including) |
Yabb | Yabb | 1_gold_-_sp_1.2 (including) | 1_gold_-_sp_1.2 (including) |
Yabb | Yabb | 1_gold_-_sp_1.3 (including) | 1_gold_-_sp_1.3 (including) |
Yabb | Yabb | 1_gold_-_sp_1.3.1 (including) | 1_gold_-_sp_1.3.1 (including) |
Yabb | Yabb | 1_gold_-_sp_1.3.2 (including) | 1_gold_-_sp_1.3.2 (including) |
Yabb | Yabb | 1_gold_-_sp_1.4 (including) | 1_gold_-_sp_1.4 (including) |
Yabb | Yabb | 1_gold_release (including) | 1_gold_release (including) |
Yabb | Yabb | 2.0 (including) | 2.0 (including) |
Yabb | Yabb | 2.0_rc1 (including) | 2.0_rc1 (including) |
Yabb | Yabb | 2.0_rc2 (including) | 2.0_rc2 (including) |