Executive Summary

Informations
Name CVE-2006-1642 First vendor Publication 2006-04-06
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.6 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cross-site scripting (XSS) vulnerability in Interact 2.1.1 allows remote attackers to inject arbitrary web script or HTML via (1) the search_terms parameter to (a) search.php, and (2) the first_name, (3) last_name, (4) email, (5) password, and (6) confirm_password parameters to (b) userinput.php. NOTE: the provenance of this information is unknown; the details are obtained from third party. In addition, the lack of precision in the third party descriptions makes it unclear whether the named vectors are correct.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1642

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

Open Source Vulnerability Database (OSVDB)

Id Description
24461 Interact userinput.php Multiple Parameter XSS

Interact contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'first_name', 'last_name', 'email', 'password', and 'confirm_password' variables upon submission to the userinput.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
24389 Interact search.php search_terms Parameter XSS

Interact contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'search_terms' variable upon submission to the search.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Sources (Detail)

http://secunia.com/advisories/19488
http://www.osvdb.org/24389
http://www.osvdb.org/24461
http://www.vupen.com/english/advisories/2006/1244
https://exchange.xforce.ibmcloud.com/vulnerabilities/25652
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-11-28 23:20:47
  • Multiple Updates
2024-11-28 12:08:39
  • Multiple Updates
2021-05-04 12:03:53
  • Multiple Updates
2021-04-22 01:04:26
  • Multiple Updates
2020-05-23 01:37:28
  • Multiple Updates
2020-05-23 00:17:37
  • Multiple Updates
2017-07-20 09:23:29
  • Multiple Updates
2016-06-28 15:43:05
  • Multiple Updates
2016-04-26 14:28:48
  • Multiple Updates
2013-05-11 10:53:34
  • Multiple Updates