Lucene search

K
nvd[email protected]NVD:CVE-2006-0800
HistoryFeb 20, 2006 - 10:02 p.m.

CVE-2006-0800

2006-02-2022:02:00
CWE-79
web.nvd.nist.gov
5

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

AI Score

5.7

Confidence

High

EPSS

0.004

Percentile

72.0%

Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing “<” character, which is interpreted as a “>” character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.

Affected configurations

Nvd
Node
postnuke_software_foundationpostnukeMatch0.7
OR
postnuke_software_foundationpostnukeMatch0.62
OR
postnuke_software_foundationpostnukeMatch0.63
OR
postnuke_software_foundationpostnukeMatch0.64
OR
postnuke_software_foundationpostnukeMatch0.70
OR
postnuke_software_foundationpostnukeMatch0.71
OR
postnuke_software_foundationpostnukeMatch0.72
OR
postnuke_software_foundationpostnukeMatch0.73
OR
postnuke_software_foundationpostnukeMatch0.74
OR
postnuke_software_foundationpostnukeMatch0.75
OR
postnuke_software_foundationpostnukeMatch0.75_rc3
OR
postnuke_software_foundationpostnukeMatch0.76_rc4
OR
postnuke_software_foundationpostnukeMatch0.76_rc4a
OR
postnuke_software_foundationpostnukeMatch0.76_rc4b
OR
postnuke_software_foundationpostnukeMatch0.703
OR
postnuke_software_foundationpostnukeMatch0.721
OR
postnuke_software_foundationpostnukeMatch0.726.3
OR
postnuke_software_foundationpostnukeMatch0.761
OR
postnuke_software_foundationpostnukeMatch0.761a
VendorProductVersionCPE
postnuke_software_foundationpostnuke0.7cpe:2.3:a:postnuke_software_foundation:postnuke:0.7:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.62cpe:2.3:a:postnuke_software_foundation:postnuke:0.62:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.63cpe:2.3:a:postnuke_software_foundation:postnuke:0.63:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.64cpe:2.3:a:postnuke_software_foundation:postnuke:0.64:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.70cpe:2.3:a:postnuke_software_foundation:postnuke:0.70:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.71cpe:2.3:a:postnuke_software_foundation:postnuke:0.71:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.72cpe:2.3:a:postnuke_software_foundation:postnuke:0.72:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.73cpe:2.3:a:postnuke_software_foundation:postnuke:0.73:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.74cpe:2.3:a:postnuke_software_foundation:postnuke:0.74:*:*:*:*:*:*:*
postnuke_software_foundationpostnuke0.75cpe:2.3:a:postnuke_software_foundation:postnuke:0.75:*:*:*:*:*:*:*
Rows per page:
1-10 of 191

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

AI Score

5.7

Confidence

High

EPSS

0.004

Percentile

72.0%

Related for NVD:CVE-2006-0800