2024-12-08 03:06:42 +00:00

152 lines
4.9 KiB
JSON

{
"id": "CVE-2006-5064",
"sourceIdentifier": "cve@mitre.org",
"published": "2006-09-28T00:07:00.000",
"lastModified": "2024-11-21T00:17:43.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in BirdBlog 1.4 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) entryid parameter in comment.php, (2) page parameter in index.php, or the (3) uid parameter in user.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en BirdBlog 1.4 y anteriores permite a un atacante remoto inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s del (1) par\u00e1metro entryid en comment.php, (2) el par\u00e1metro de p\u00e1gina en index.php, p (3) el par\u00e1metro uid en user.php. NOTA: el origen de esta informaci\u00f3n es desconocido; los detalles se obtuvieron de terceras fuentes de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE95DA3-47CF-4756-935E-8F4A6CA995EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F25C8F90-AA95-4466-8A2B-6D4E3A9B912F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A97221-1BEC-4E51-A20C-2CE83CFA5A23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B00115B8-4876-45DB-B99A-219BCC49680B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "524DBD93-0778-4C52-87B6-060284092958"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "75A0BD22-C568-4259-9933-B6A505A22B12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:birdblog:birdblog:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B24132-D1AA-44AF-8BE0-24FFF9118BCE"
}
]
}
]
}
],
"references": [
{
"url": "http://securitytracker.com/id?1017258",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/31367",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/31368",
"source": "cve@mitre.org"
},
{
"url": "http://www.osvdb.org/31369",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/20202",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "http://securitytracker.com/id?1017258",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/31367",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/31368",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.osvdb.org/31369",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/20202",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}