mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
168 lines
5.9 KiB
JSON
168 lines
5.9 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-2635",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Multiple cross-site scripting (XSS) vulnerabilities in Tikiwiki (aka Tiki CMS/Groupware) 1.9.x allow remote attackers to inject arbitrary web script or HTML via malformed nested HTML tags such as \"<scr<script>ipt>\" in (1) offset and (2) days parameters in (a) tiki-lastchanges.php, the (3) find and (4) offset parameters in (b) tiki-orphan_pages.php, the (5) offset and (6) initial parameters in (c) tiki-listpages.php, and (7) an unspecified field in (d) tiki-remind_password.php; and allow remote authenticated users with admin privileges to inject arbitrary web script or HTML via (8) an unspecified field in a metatags action in (e) tiki-admin.php, the (9) offset parameter in (f) tiki-admin_rssmodules.php, the (10) offset and (11) max parameters in (g) tiki-syslog.php, the (12) numrows parameter in (h) tiki-adminusers.php, (13) an unspecified field in (i) tiki-adminusers.php, (14) an unspecified field in (j) tiki-admin_hotwords.php, unspecified fields in (15) \"Assign new module\" and (16) \"Create new user module\" in (k) tiki-admin_modules.php, (17) an unspecified field in \"Add notification\" in (l) tiki-admin_notifications.php, (18) the offset parameter in (m) tiki-admin_notifications.php, the (19) Name and (20) Dsn fields in (o) tiki-admin_dsn.php, the (21) offset parameter in (p) tiki-admin_content_templates.php, (22) an unspecified field in \"Create new template\" in (q) tiki-admin_content_templates.php, and the (23) offset parameter in (r) tiki-admin_chat.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060525 Multiple XSS Vulnerabilities in Tikiwiki 1.9.x",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/435127/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "20060608 Tikiwiki 1.9.3.2 security release",
|
|
"refsource" : "BUGTRAQ",
|
|
"url" : "http://www.securityfocus.com/archive/1/436432/100/0/threaded"
|
|
},
|
|
{
|
|
"name" : "http://tikiwiki.org/tiki-read_article.php?articleId=131",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://tikiwiki.org/tiki-read_article.php?articleId=131"
|
|
},
|
|
{
|
|
"name" : "18143",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/18143"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-2024",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/2024"
|
|
},
|
|
{
|
|
"name" : "26048",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26048"
|
|
},
|
|
{
|
|
"name" : "26049",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26049"
|
|
},
|
|
{
|
|
"name" : "26050",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26050"
|
|
},
|
|
{
|
|
"name" : "26051",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26051"
|
|
},
|
|
{
|
|
"name" : "26052",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26052"
|
|
},
|
|
{
|
|
"name" : "26053",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26053"
|
|
},
|
|
{
|
|
"name" : "26054",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26054"
|
|
},
|
|
{
|
|
"name" : "26055",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26055"
|
|
},
|
|
{
|
|
"name" : "26056",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26056"
|
|
},
|
|
{
|
|
"name" : "26057",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26057"
|
|
},
|
|
{
|
|
"name" : "26058",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26058"
|
|
},
|
|
{
|
|
"name" : "26059",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26059"
|
|
},
|
|
{
|
|
"name" : "26060",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26060"
|
|
},
|
|
{
|
|
"name" : "26061",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26061"
|
|
},
|
|
{
|
|
"name" : "26062",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/26062"
|
|
},
|
|
{
|
|
"name" : "20334",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/20334"
|
|
},
|
|
{
|
|
"name" : "976",
|
|
"refsource" : "SREASON",
|
|
"url" : "http://securityreason.com/securityalert/976"
|
|
}
|
|
]
|
|
}
|
|
}
|