2.6
CVE-2006-0800
- EPSS 7.48%
- Published 20.02.2006 22:02:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Interpretation conflict in PostNuke 0.761 and earlier allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML tags with a trailing "<" character, which is interpreted as a ">" character by some web browsers but bypasses the blacklist protection in (1) the pnVarCleanFromInput function in pnAPI.php, (2) the pnSecureInput function in pnAntiCracker.php, and (3) the htmltext parameter in an edituser operation to user.php.
Data is provided by the National Vulnerability Database (NVD)
Postnuke Software Foundation ≫ Postnuke Version0.7
Postnuke Software Foundation ≫ Postnuke Version0.62
Postnuke Software Foundation ≫ Postnuke Version0.63
Postnuke Software Foundation ≫ Postnuke Version0.64
Postnuke Software Foundation ≫ Postnuke Version0.70
Postnuke Software Foundation ≫ Postnuke Version0.71
Postnuke Software Foundation ≫ Postnuke Version0.72
Postnuke Software Foundation ≫ Postnuke Version0.73
Postnuke Software Foundation ≫ Postnuke Version0.74
Postnuke Software Foundation ≫ Postnuke Version0.75
Postnuke Software Foundation ≫ Postnuke Version0.75_rc3
Postnuke Software Foundation ≫ Postnuke Version0.76_rc4
Postnuke Software Foundation ≫ Postnuke Version0.76_rc4a
Postnuke Software Foundation ≫ Postnuke Version0.76_rc4b
Postnuke Software Foundation ≫ Postnuke Version0.703
Postnuke Software Foundation ≫ Postnuke Version0.721
Postnuke Software Foundation ≫ Postnuke Version0.726.3
Postnuke Software Foundation ≫ Postnuke Version0.761
Postnuke Software Foundation ≫ Postnuke Version0.761a
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 7.48% | 0.909 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.