Multiple cross-site scripting (XSS) vulnerabilities in David Bennett PHP-Post (PHPp) 1.0 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the replyuser parameter in (a) pm.php; (2) the txt_jumpto parameter in (b) dropdown.php; the (3) txt_error and (4) txt_templatenotexist parameters in © template.php; the (5) split parameter in certain files, as demonstrated by (d) editprofile.php, (e) search.php, (f) index.php, and (g) pm.php; and the (6) txt_login parameter in (h) loginline.php; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) txt_logout parameter in (i) loginline.php.
secunia.com/advisories/22014
securityreason.com/securityalert/1607
www.osvdb.org/28968
www.osvdb.org/28969
www.osvdb.org/28970
www.osvdb.org/28971
www.osvdb.org/28972
www.securityfocus.com/archive/1/446318/100/0/threaded
www.securityfocus.com/bid/20061
www.vupen.com/english/advisories/2006/3688
exchange.xforce.ibmcloud.com/vulnerabilities/29017