FKIE_CVE-2006-1222

Vulnerability from fkie_nvd - Published: 2006-03-14 11:02 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in zeroboard 4.1 pl7 allows allow remote attackers to inject arbitrary web script or HTML via the (1) memo box title, (2) user email, and (3) homepage fields.
References
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.htmlExploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19214Patch, Vendor Advisory
cve@mitre.orghttp://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdfVendor Advisory
cve@mitre.orghttp://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406
cve@mitre.orghttp://www.osvdb.org/23847
cve@mitre.orghttp://www.securityfocus.com/archive/1/427466/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/17075Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0944
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/25212
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.htmlExploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19214Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdfVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/23847
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/427466/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17075Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0944
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/25212
Impacted products
Vendor Product Version
zeroboard zeroboard 4.1_pl2
zeroboard zeroboard 4.1_pl3
zeroboard zeroboard 4.1_pl4
zeroboard zeroboard 4.1_pl5
zeroboard zeroboard 4.1_pl6
zeroboard zeroboard 4.1_pl7

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl2:*:*:*:*:*:*:*",
              "matchCriteriaId": "021147FB-D153-440D-95F2-B812FB9DEA19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAEFB19-C049-4C09-89CF-00E128FEC5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9FC71F5-C279-40A8-ABC3-5A141D7DF419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl5:*:*:*:*:*:*:*",
              "matchCriteriaId": "837FA51A-A0C2-4BC0-9349-DB220BBB7A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl6:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C7E8DA-5108-4928-B05E-70827B5F39B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zeroboard:zeroboard:4.1_pl7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B384EB69-8D0C-4D15-B650-D157DE6E559A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in zeroboard 4.1 pl7 allows allow remote attackers to inject arbitrary web script or HTML via the (1) memo box title, (2) user email, and (3) homepage fields."
    }
  ],
  "id": "CVE-2006-1222",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-03-14T11:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19214"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2\u0026no=5406"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23847"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/427466/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17075"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0944"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2\u0026no=5406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/427466/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/17075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25212"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…