cvelist/2006/1xxx/CVE-2006-1407.json

102 lines
3.3 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 22:02:21 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-1407",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 22:02:21 +00:00
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Helm Web Hosting Control Panel 3.2.10 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) txtDomainName parameter to domains.asp or (2) SearchText or (3) UserLevel parameters to default.asp."
2017-10-16 12:31:07 -04:00
}
2019-03-17 22:02:21 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-1093",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/1093"
},
{
"name": "24125",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24125"
},
{
"name": "24126",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/24126"
},
{
"name": "19375",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/19375"
},
{
"name": "http://pridels0.blogspot.com/2006/03/helm-web-hosting-control-panel-xss.html",
"refsource": "MISC",
"url": "http://pridels0.blogspot.com/2006/03/helm-web-hosting-control-panel-xss.html"
},
{
"name": "17263",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/17263"
},
{
"name": "helm-domainsusersdefaault-xss(30309)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30309"
},
{
"name": "helm-domainsdefault-xss(25470)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25470"
},
{
"name": "20060327 Helm Control Panel followup",
"refsource": "VIM",
"url": "http://attrition.org/pipermail/vim/2006-March/000654.html"
}
]
}
}