Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

4 vulnerabilities by upoint

CVE-2006-1436 (GCVE-0-2006-1436)

Vulnerability from cvelistv5 – Published: 2006-04-15 23:00 – Updated: 2024-08-07 17:12
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/19727 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/24236 vdb-entryx_refsource_OSVDB
http://osvdb.org/ref/24/24236-upoint.txt x_refsource_MISC
http://www.securityfocus.com/bid/17646 vdb-entryx_refsource_BID
http://www.osvdb.org/24235 vdb-entryx_refsource_OSVDB
Date Public ?
2006-03-27 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.182Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "19727",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19727"
          },
          {
            "name": "24236",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24236"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://osvdb.org/ref/24/24236-upoint.txt"
          },
          {
            "name": "17646",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17646"
          },
          {
            "name": "24235",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24235"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-05-10T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "19727",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19727"
        },
        {
          "name": "24236",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24236"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://osvdb.org/ref/24/24236-upoint.txt"
        },
        {
          "name": "17646",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17646"
        },
        {
          "name": "24235",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24235"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1436",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "19727",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19727"
            },
            {
              "name": "24236",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24236"
            },
            {
              "name": "http://osvdb.org/ref/24/24236-upoint.txt",
              "refsource": "MISC",
              "url": "http://osvdb.org/ref/24/24236-upoint.txt"
            },
            {
              "name": "17646",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17646"
            },
            {
              "name": "24235",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24235"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1436",
    "datePublished": "2006-04-15T23:00:00.000Z",
    "dateReserved": "2006-03-28T00:00:00.000Z",
    "dateUpdated": "2024-08-07T17:12:22.182Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1437 (GCVE-0-2006-1437)

Vulnerability from cvelistv5 – Published: 2006-04-15 23:00 – Updated: 2024-08-07 17:12
VLAI?
Summary
UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/17647 vdb-entryx_refsource_BID
http://secunia.com/advisories/19727 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/ref/24/24236-upoint.txt x_refsource_MISC
http://www.osvdb.org/24237 vdb-entryx_refsource_OSVDB
Date Public ?
2006-03-27 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:12:22.098Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17647"
          },
          {
            "name": "19727",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19727"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://osvdb.org/ref/24/24236-upoint.txt"
          },
          {
            "name": "24237",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24237"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-05-10T09:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17647"
        },
        {
          "name": "19727",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19727"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://osvdb.org/ref/24/24236-upoint.txt"
        },
        {
          "name": "24237",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24237"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1437",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17647"
            },
            {
              "name": "19727",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19727"
            },
            {
              "name": "http://osvdb.org/ref/24/24236-upoint.txt",
              "refsource": "MISC",
              "url": "http://osvdb.org/ref/24/24236-upoint.txt"
            },
            {
              "name": "24237",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24237"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1437",
    "datePublished": "2006-04-15T23:00:00.000Z",
    "dateReserved": "2006-03-28T00:00:00.000Z",
    "dateUpdated": "2024-08-07T17:12:22.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1278 (GCVE-0-2006-1278)

Vulnerability from cvelistv5 – Published: 2006-03-19 11:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php. NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/23855 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23857 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23864 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/31063 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/23863 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/archive/1/428659/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/23852 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2006/0943 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/23861 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/19224 third-party-advisoryx_refsource_SECUNIA
http://www.attrition.org/pipermail/vim/2009-Augus… mailing-listx_refsource_VIM
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.osvdb.org/23853 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23860 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23856 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1015826 vdb-entryx_refsource_SECTRACK
http://osvdb.org/47018 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23858 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23854 vdb-entryx_refsource_OSVDB
http://osvdb.org/47017 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/17090 vdb-entryx_refsource_BID
http://evuln.com/vulns/95/summary.html x_refsource_MISC
http://www.osvdb.org/23851 vdb-entryx_refsource_OSVDB
http://www.osvdb.org/23862 vdb-entryx_refsource_OSVDB
https://www.exploit-db.com/exploits/6040 exploitx_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/619 third-party-advisoryx_refsource_SREASON
http://www.osvdb.org/24106 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/30182 vdb-entryx_refsource_BID
http://www.osvdb.org/23859 vdb-entryx_refsource_OSVDB
Date Public ?
2006-03-11 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "23855",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23855"
          },
          {
            "name": "23857",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23857"
          },
          {
            "name": "23864",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23864"
          },
          {
            "name": "31063",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31063"
          },
          {
            "name": "23863",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23863"
          },
          {
            "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
          },
          {
            "name": "23852",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23852"
          },
          {
            "name": "ADV-2006-0943",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0943"
          },
          {
            "name": "23861",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23861"
          },
          {
            "name": "filestore-multiple-sql-injection(25183)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
          },
          {
            "name": "19224",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19224"
          },
          {
            "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
          },
          {
            "name": "filestorepro-id-sql-injection(43718)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
          },
          {
            "name": "23853",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23853"
          },
          {
            "name": "23860",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23860"
          },
          {
            "name": "23856",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23856"
          },
          {
            "name": "1015826",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015826"
          },
          {
            "name": "47018",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/47018"
          },
          {
            "name": "23858",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23858"
          },
          {
            "name": "23854",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23854"
          },
          {
            "name": "47017",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/47017"
          },
          {
            "name": "filestorepro-download-file-include(43724)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
          },
          {
            "name": "17090",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17090"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://evuln.com/vulns/95/summary.html"
          },
          {
            "name": "23851",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23851"
          },
          {
            "name": "23862",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23862"
          },
          {
            "name": "6040",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6040"
          },
          {
            "name": "619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/619"
          },
          {
            "name": "24106",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24106"
          },
          {
            "name": "30182",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30182"
          },
          {
            "name": "23859",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23859"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "23855",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23855"
        },
        {
          "name": "23857",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23857"
        },
        {
          "name": "23864",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23864"
        },
        {
          "name": "31063",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31063"
        },
        {
          "name": "23863",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23863"
        },
        {
          "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
        },
        {
          "name": "23852",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23852"
        },
        {
          "name": "ADV-2006-0943",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0943"
        },
        {
          "name": "23861",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23861"
        },
        {
          "name": "filestore-multiple-sql-injection(25183)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
        },
        {
          "name": "19224",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19224"
        },
        {
          "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
        },
        {
          "name": "filestorepro-id-sql-injection(43718)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
        },
        {
          "name": "23853",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23853"
        },
        {
          "name": "23860",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23860"
        },
        {
          "name": "23856",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23856"
        },
        {
          "name": "1015826",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015826"
        },
        {
          "name": "47018",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/47018"
        },
        {
          "name": "23858",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23858"
        },
        {
          "name": "23854",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23854"
        },
        {
          "name": "47017",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/47017"
        },
        {
          "name": "filestorepro-download-file-include(43724)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
        },
        {
          "name": "17090",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17090"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://evuln.com/vulns/95/summary.html"
        },
        {
          "name": "23851",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23851"
        },
        {
          "name": "23862",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23862"
        },
        {
          "name": "6040",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6040"
        },
        {
          "name": "619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/619"
        },
        {
          "name": "24106",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24106"
        },
        {
          "name": "30182",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30182"
        },
        {
          "name": "23859",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23859"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1278",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in @1 File Store 2006.03.07 allows remote attackers to execute arbitrary SQL commands via the id parameter to (1) functions.php and (2) user.php in the libs directory, (3) edit.php and (4) delete.php in control/files/, (5) edit.php and (6) delete.php in control/users/, (7) edit.php, (8) access.php, and (9) in control/folders/, (10) access.php and (11) delete.php in control/groups/, (12) confirm.php, and (13) download.php; (14) the email parameter in password.php, and (15) the id parameter in folder.php.  NOTE: it was later reported that vectors 12 and 13 also affect @1 File Store PRO 3.2."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "23855",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23855"
            },
            {
              "name": "23857",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23857"
            },
            {
              "name": "23864",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23864"
            },
            {
              "name": "31063",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31063"
            },
            {
              "name": "23863",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23863"
            },
            {
              "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
            },
            {
              "name": "23852",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23852"
            },
            {
              "name": "ADV-2006-0943",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0943"
            },
            {
              "name": "23861",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23861"
            },
            {
              "name": "filestore-multiple-sql-injection(25183)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25183"
            },
            {
              "name": "19224",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19224"
            },
            {
              "name": "20090825 @1 File Store PRO SQL injection - the old gray dupe",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2009-August/002246.html"
            },
            {
              "name": "filestorepro-id-sql-injection(43718)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43718"
            },
            {
              "name": "23853",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23853"
            },
            {
              "name": "23860",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23860"
            },
            {
              "name": "23856",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23856"
            },
            {
              "name": "1015826",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015826"
            },
            {
              "name": "47018",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/47018"
            },
            {
              "name": "23858",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23858"
            },
            {
              "name": "23854",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23854"
            },
            {
              "name": "47017",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/47017"
            },
            {
              "name": "filestorepro-download-file-include(43724)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43724"
            },
            {
              "name": "17090",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17090"
            },
            {
              "name": "http://evuln.com/vulns/95/summary.html",
              "refsource": "MISC",
              "url": "http://evuln.com/vulns/95/summary.html"
            },
            {
              "name": "23851",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23851"
            },
            {
              "name": "23862",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23862"
            },
            {
              "name": "6040",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6040"
            },
            {
              "name": "619",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/619"
            },
            {
              "name": "24106",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24106"
            },
            {
              "name": "30182",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30182"
            },
            {
              "name": "23859",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23859"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1278",
    "datePublished": "2006-03-19T11:00:00.000Z",
    "dateReserved": "2006-03-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T17:03:28.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1277 (GCVE-0-2006-1277)

Vulnerability from cvelistv5 – Published: 2006-03-19 11:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in signup.php in @1 File Store 2006.03.07 allows remote attackers to inject arbitrary web script or HTML via the (1) real_name, (2) email, and (3) login parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/428659/100… mailing-listx_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/0943 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/19224 third-party-advisoryx_refsource_SECUNIA
http://securitytracker.com/id?1015826 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/17090 vdb-entryx_refsource_BID
http://www.osvdb.org/23850 vdb-entryx_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://evuln.com/vulns/95/summary.html x_refsource_MISC
Date Public ?
2006-03-11 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.796Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
          },
          {
            "name": "ADV-2006-0943",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0943"
          },
          {
            "name": "19224",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19224"
          },
          {
            "name": "1015826",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015826"
          },
          {
            "name": "17090",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17090"
          },
          {
            "name": "23850",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23850"
          },
          {
            "name": "filestore-signup-xss(25182)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25182"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://evuln.com/vulns/95/summary.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-11T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in signup.php in @1 File Store 2006.03.07 allows remote attackers to inject arbitrary web script or HTML via the (1) real_name, (2) email, and (3) login parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
        },
        {
          "name": "ADV-2006-0943",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0943"
        },
        {
          "name": "19224",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19224"
        },
        {
          "name": "1015826",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015826"
        },
        {
          "name": "17090",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17090"
        },
        {
          "name": "23850",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23850"
        },
        {
          "name": "filestore-signup-xss(25182)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25182"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://evuln.com/vulns/95/summary.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in signup.php in @1 File Store 2006.03.07 allows remote attackers to inject arbitrary web script or HTML via the (1) real_name, (2) email, and (3) login parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20060324 [eVuln] @1 File Store Multiple XSS and SQL Injection Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428659/100/0/threaded"
            },
            {
              "name": "ADV-2006-0943",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0943"
            },
            {
              "name": "19224",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19224"
            },
            {
              "name": "1015826",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015826"
            },
            {
              "name": "17090",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17090"
            },
            {
              "name": "23850",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23850"
            },
            {
              "name": "filestore-signup-xss(25182)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25182"
            },
            {
              "name": "http://evuln.com/vulns/95/summary.html",
              "refsource": "MISC",
              "url": "http://evuln.com/vulns/95/summary.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1277",
    "datePublished": "2006-03-19T11:00:00.000Z",
    "dateReserved": "2006-03-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T17:03:28.796Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}