mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
251 lines
8.5 KiB
JSON
251 lines
8.5 KiB
JSON
{
|
|
"id": "CVE-2006-0407",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2006-01-25T02:03:00.000",
|
|
"lastModified": "2024-11-21T00:06:23.477",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Cross-site scripting (XSS) vulnerability in post.php in AZ Bulletin Board (AZbb) 1.1.00 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) nickname parameter and (2) an iframe tag in the topic parameter. NOTE: the original disclosure specified the name parameter, but a correction was later provided. NOTE: followup posts have both disputed and confirmed the original claim."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en post.php en AZ Bulletin Board (AZbb) 1.1.00 y anteriores permiten a atacantes remotos inyectar 'script' web arbitrario o HTML mediante el par\u00e1metro (1) \"nickname\" y la etiqueta (2) \"iframe\" en el par\u00e1metro \"topic\". NOTA: la informaci\u00f3n original especificaba el par\u00e1metro \"nombre\", pero fue provista un correcci\u00f3n posterior. NOTA: Subsiguientes mensajes han disputado y confirmado la afirmaci\u00f3n original."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"baseScore": 4.3,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "939D82E6-38D9-4E4C-BC49-853233032584"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.0rc1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CF6081A7-D471-448D-95F7-6E5166D2686C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.0rc2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "382B925E-C27F-4C7C-A267-115620E8FF23"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86C62998-3908-4FEC-970C-EFEECEE74C08"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D85A6EE8-2865-45CE-93E0-EC49F9083205"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "89609095-529E-48B7-9EDF-5DAC1797E4A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4E67B981-79D8-4763-B5EA-3222BF8EBEE6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91B492BD-3D65-4BB9-9C6A-064399254238"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F044064-ED89-4A59-B28D-C8F996F420B1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2BBA7461-71B1-4F0C-8239-354A3382322B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8557351D-A835-4D16-97F7-29A5111DBAFD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3F519ADB-D0C8-4BD3-AF62-023B7F696066"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2B80696-8241-4480-A927-F8A56CC2A74D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "147247D2-7D7F-4CB0-AA84-F37F92833F90"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.0.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "64917D79-8A70-497F-8AAC-B1AD98942AE3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:azbb:az_bulletin_board:1.1.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC8EF66C-BB88-4DA4-BD31-4101B33B4C15"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://kapda.ir/advisory-236.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/18565",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/423353/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/423363/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427076/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427076/30/6510/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427194/100/0/threaded",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/16351",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/0298",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24274",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://kapda.ir/advisory-236.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/18565",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/423353/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/423363/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427076/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427076/30/6510/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/archive/1/427194/100/0/threaded",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/16351",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2006/0298",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24274",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |