CVE-2006-3063
Published Jun 19, 2006
Last updated 7 years ago
Overview
- Description
- Multiple cross-site scripting (XSS) vulnerabilities in myPHP Guestbook 1.x through 2.0.0-r1 and before 2.0.1 RC5 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) email, (3) homepage, (4) id, (5) name, and (6) text parameters in (a) index.php, the (7) comment, (8) email, (9) homepage, (10) number, (11) name, and (12) text parameters in (b) admin/guestbook.php, and the (13) email, (14) homepage, (15) icq, (16) name, and (17) text parameters in (c) admin/edit.php.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.6
- Impact score
- 2.9
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEB92A38-41B3-4E8E-9396-340A4E9D01D2" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47132A18-64DD-4DA3-9130-71E1BF689F99" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE54EDCB-FDDD-4E4C-8AE4-2E2F2BA0B7F3" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E105BB6B-DFF8-40FF-8DE7-830908841263" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:1.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5951406C-4460-42D2-B0AF-3BC5F0FD2738" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8419132F-D109-446C-AD91-8694888A699C" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0-r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D94A4B-8475-4BAA-8434-4B857E4CB188" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_alpha:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97EE480B-D147-4C8B-AE90-70E6D9E166C0" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D1537F6-92E9-413F-89E0-EE5011DBBE1E" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ADDFDFC-7AB4-4A7F-B75F-412A4165A5D5" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E3D6891-BF1F-4080-81E3-A5A75B54C16B" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "424B22E0-C10D-4413-9638-1C5F89F99902" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.0_rc4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1DB7E63-09E1-4BF6-A826-F1072BD2D7B3" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.1_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "324788C8-73BB-40FC-901D-C5DDA98541FE" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.1_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "094BDBC2-4BBE-491C-8311-952508C41AA0" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.1_rc2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "181549D7-1F12-4483-AD6C-35DCC52EF22D" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.1_rc3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "843ADF77-4300-44B0-8490-FB4B6C1FBAFC" }, { "criteria": "cpe:2.3:a:myphp_guestbook:myphp_guestbook:2.0.1_rc4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAB4501F-3C6E-4D56-B7A3-88D637137F1B" } ], "operator": "OR" } ] } ]