CVE-2006-6721
Knusperleicht Shoutbox 2.6 - 'Shout.php' HTML Injection
Severity Score
6.8
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Multiple cross-site scripting (XSS) vulnerabilities in shout.php in Knusperleicht ShoutBox 2.6 allow remote attackers to inject arbitrary web script or HTML via the (1) sbNick or (2) sbKommentar parameter.
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en
shout.php de Knusperleicht ShoutBox 2.6 permiten a un atacante remoto inyectar secuencias de comandos web o HTML mediante los parĂ¡metros (1) sbNick o (2) sbKommentar.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2006-12-18 First Exploit
- 2006-12-22 CVE Reserved
- 2006-12-23 CVE Published
- 2024-05-17 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/23526 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/29294 | 2006-12-18 | |
http://www.securityfocus.com/bid/21637 | 2024-08-07 | |
http://www.securityfocus.com/data/vulnerabilities/exploits/21637.html | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Knusperleicht Search vendor "Knusperleicht" | Shoutbox Search vendor "Knusperleicht" for product "Shoutbox" | 2.6 Search vendor "Knusperleicht" for product "Shoutbox" and version "2.6" | - |
Affected
|