Логотип exploitDog
bind:CVE-2006-2109
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-2109

Количество 3

Количество 3

nvd логотип

CVE-2006-2109

почти 20 лет назад

Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.

CVSS2: 6.8
EPSS: Низкий
debian логотип

CVE-2006-2109

почти 20 лет назад

Cross-site scripting (XSS) vulnerability in the parse_query_str functi ...

CVSS2: 6.8
EPSS: Низкий
github логотип

GHSA-g6xf-q258-jm36

почти 4 года назад

Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-2109

Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.

CVSS2: 6.8
7%
Низкий
почти 20 лет назад
debian логотип
CVE-2006-2109

Cross-site scripting (XSS) vulnerability in the parse_query_str functi ...

CVSS2: 6.8
7%
Низкий
почти 20 лет назад
github логотип
GHSA-g6xf-q258-jm36

Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.

7%
Низкий
почти 4 года назад

Уязвимостей на страницу