mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
118 lines
3.6 KiB
JSON
118 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2006-2109",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-05-02T10:02:00.000",
|
|
"lastModified": "2018-10-18T16:38:12.520",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nJSBoard, JSBoard, 2.0.12",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": true,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jsboard:jsboard:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "2.0.11",
|
|
"matchCriteriaId": "97672C81-9E3E-44FC-860F-4F9828E200C3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jsboard:jsboard:2.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B67EEA77-8166-4F5A-8C3F-0405EE7A6761"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jsboard:jsboard:2.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E37ED4D7-A553-4D37-9B46-0F8D7802A466"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jsboard:jsboard:2.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C2DD6C73-07BA-4576-971F-37976C38053A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:jsboard:jsboard:2.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C51965A7-0D08-419D-9411-AC7CE29E2146"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/432714/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/17778",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/1636",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26211",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |