2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-0593" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-02-08T01:02:00.000" ,
2024-11-22 01:07:11 +00:00
"lastModified" : "2024-11-21T00:06:50.080" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cross-site scripting (XSS) vulnerability in PHP-Fusion before 6.00.304 allows remote attackers to inject arbitrary web script or HTML via the (1) shout_name field in shoutbox_panel.php and the (2) comments field in comments_include.php."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
2024-11-22 01:07:11 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 01:07:11 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.100:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61EB6101-6BD0-4D6A-B681-7607B9424977"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.101:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D2AB1FF-B81B-4F19-9192-1E1CB66516D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.102:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5D4A233-7466-4F44-8468-779AA6A60850"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.103:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "29821D4F-1EF2-4DA0-8CAB-67700D0B1A13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.104:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD1DCE7B-E049-4FA0-A972-D39BCE79E1C3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.105:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4D79B94-BBA2-47D2-9D2C-5EF59FE6D7B7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.106:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E92E863F-C72B-428E-A134-2CA5CA7058B5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.107:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BFC61337-9477-46AC-AA5E-7722F594BCAE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.108:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6716EE68-D01C-4C5B-ACA5-30E58B834C4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.109:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1318098-F9B4-4BE8-AB18-3EB82DE4E740"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.110:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ECBE45DB-64DA-4EC5-9DF0-749D533E7510"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.200:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A59B4A30-B3F1-4200-844E-E3F7EEA91214"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.204:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B24DACA-1F61-4AD6-9074-F330EFB28B92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.205:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2252C51-1FA4-469B-B241-8EDB1D3DFB70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.206:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5335762A-EA49-48D3-8A0C-0C031FECBC91"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.207:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "25A8E77C-4687-4A3E-8112-52717E885C19"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.300:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49CDAEAF-9E2E-42F4-B7D7-EF121CC5F978"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php_fusion:php_fusion:6.00.303:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D15B4762-66F2-4277-A975-00401C78F381"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/18949" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.osvdb.org/22980" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.osvdb.org/22981" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.php-fusion.co.uk/downloads.php?cat_id=3" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.php-fusion.co.uk/news.php?readmore=307" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/16548" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/0463" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24548" ,
"source" : "cve@mitre.org"
2024-11-22 01:07:11 +00:00
} ,
{
"url" : "http://secunia.com/advisories/18949" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/22980" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.osvdb.org/22981" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.php-fusion.co.uk/downloads.php?cat_id=3" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.php-fusion.co.uk/news.php?readmore=307" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/16548" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/0463" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24548" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}