mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
187 lines
7.4 KiB
JSON
187 lines
7.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-3312",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple cross-site scripting (XSS) vulnerabilities in ashmans and Bill Echlin QaTraq 6.5 RC and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) link_print, (2) link_upgrade, (3) link_sql, (4) link_next, (5) link_prev, and (6) link_list parameters in top.inc as included by queries_view_search.php; the (7) msg, (8) component_name, and (9) component_desc parameters in (a) components_copy_content.php, (b) components_modify_content.php, and (c) components_new_content.php; the (10) title, (11) version, and (12) content parameters in design_copy_content.php; the (13) plan_title and (14) plan_content parameters in design_copy_plan_search.php; the (15) title, (16) minor_version, (17) new_version, and (18) content parameters in design_modify_content.php; the (19) title, (20) version, and (21) content parameters in design_new_content.php; the (22) plan_name and (23) plan_desc parameters in design_new_search.php; the (24) file_name parameter in download.php; the (25) username and (26) password parameters in login.php; the (27) title, (28) version, and (29) content parameters in phase_copy_content.php; the (30) content parameter in phase_delete_search.php; the (31) title, (32) minor_version, (33) new_version, and (34) content parameters in phase_modify_content.php; the (35) content, (36) title, (37) version, and (38) content parameters in phase_modify_search.php; the (39) content parameter in phase_view_search.php; the (40) msg, (41) product_name, and (42) product_desc parameters in products_copy_content.php; and possibly the (43) product_name and (44) product_desc parameters in (d) products_copy_search.php, and a large number of additional parameters and executables. NOTE: the vendor notified CVE via e-mail that this issue has been fixed in the 6.8 RC release."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "27603",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27603"
|
|
},
|
|
{
|
|
"name": "20060811 QaTraq multiple cross-site scripting vulnerabilities (fwd)",
|
|
"refsource": "VIM",
|
|
"url": "http://www.attrition.org/pipermail/vim/2006-August/000969.html"
|
|
},
|
|
{
|
|
"name": "http://www.testmanagement.com/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.testmanagement.com/"
|
|
},
|
|
{
|
|
"name": "27611",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27611"
|
|
},
|
|
{
|
|
"name": "27614",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27614"
|
|
},
|
|
{
|
|
"name": "http://seclab.tuwien.ac.at/advisories/TUVSA-0606-001.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://seclab.tuwien.ac.at/advisories/TUVSA-0606-001.txt"
|
|
},
|
|
{
|
|
"name": "27602",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27602"
|
|
},
|
|
{
|
|
"name": "27610",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27610"
|
|
},
|
|
{
|
|
"name": "1016381",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1016381"
|
|
},
|
|
{
|
|
"name": "27612",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27612"
|
|
},
|
|
{
|
|
"name": "27607",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27607"
|
|
},
|
|
{
|
|
"name": "27606",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27606"
|
|
},
|
|
{
|
|
"name": "18620",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/18620"
|
|
},
|
|
{
|
|
"name": "27609",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27609"
|
|
},
|
|
{
|
|
"name": "27608",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27608"
|
|
},
|
|
{
|
|
"name": "27599",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27599"
|
|
},
|
|
{
|
|
"name": "27613",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27613"
|
|
},
|
|
{
|
|
"name": "27615",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27615"
|
|
},
|
|
{
|
|
"name": "27605",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27605"
|
|
},
|
|
{
|
|
"name": "1169",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/1169"
|
|
},
|
|
{
|
|
"name": "27616",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27616"
|
|
},
|
|
{
|
|
"name": "qatraq-multiple-xss(27355)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27355"
|
|
},
|
|
{
|
|
"name": "27600",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27600"
|
|
},
|
|
{
|
|
"name": "27601",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27601"
|
|
},
|
|
{
|
|
"name": "27604",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/27604"
|
|
},
|
|
{
|
|
"name": "20060623 QaTraq 6.5 RC: Multiple XSS Vulnerabilities",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/438151/100/0/threaded"
|
|
}
|
|
]
|
|
}
|
|
} |