FKIE_CVE-2006-2951

Vulnerability from fkie_nvd - Published: 2006-06-12 20:06 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Net Portal Dynamic System (NPDS) 5.10 and earlier allow remote attackers to inject arbitrary web script and HTML via the (1) Titlesitename or (2) sitename parameter to (a) header.php, (3) nuke_url parameter to (b) meta/meta.php, (4) forum parameter to (c) viewforum.php, (5) post_id, (6) forum, (7) topic, or (8) arbre parameter to (d) editpost.php, or (9) uname or (10) email parameter to (e) user.php.
References
cve@mitre.orghttp://secunia.com/advisories/20523Exploit, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/1076
cve@mitre.orghttp://www.acid-root.new.fr/advisories/npds510.txtExploit
cve@mitre.orghttp://www.osvdb.org/26292
cve@mitre.orghttp://www.osvdb.org/26293
cve@mitre.orghttp://www.osvdb.org/26294
cve@mitre.orghttp://www.osvdb.org/26295
cve@mitre.orghttp://www.osvdb.org/26296
cve@mitre.orghttp://www.securityfocus.com/archive/1/436442/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/18383
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2233Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27123
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20523Exploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/1076
af854a3a-2127-422b-91ae-364da2661108http://www.acid-root.new.fr/advisories/npds510.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26292
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26293
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26294
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26295
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/26296
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/436442/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18383
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2233Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27123
Impacted products
Vendor Product Version
npds npds *
npds npds 4.8
npds npds 5.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:npds:npds:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A0C857-DE3B-479F-8229-B63E2CEE454D",
              "versionEndIncluding": "5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:npds:npds:4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D565FC-1787-4076-8C5F-265D6BFF9D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:npds:npds:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "35D63132-CB80-46B8-A225-D05818EC437A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Net Portal Dynamic System (NPDS) 5.10 and earlier allow remote attackers to inject arbitrary web script and HTML via the (1) Titlesitename or (2) sitename parameter to (a) header.php, (3) nuke_url parameter to (b) meta/meta.php, (4) forum parameter to (c) viewforum.php, (5) post_id, (6) forum, (7) topic, or (8) arbre parameter to (d) editpost.php, or (9) uname or (10) email parameter to (e) user.php."
    }
  ],
  "id": "CVE-2006-2951",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-06-12T20:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20523"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/1076"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.acid-root.new.fr/advisories/npds510.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26292"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26293"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26294"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26295"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/26296"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/436442/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18383"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2233"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20523"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/1076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.acid-root.new.fr/advisories/npds510.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26292"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26294"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26295"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/26296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/436442/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2233"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27123"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…