Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2006-03-12T00:00:00", "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in zeroboard 4.1 pl7 allows allow remote attackers to inject arbitrary web script or HTML via the (1) memo box title, (2) user email, and (3) homepage fields."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "19214", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/19214"}, {"tags": ["x_refsource_MISC"], "url": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf"}, {"name": "ADV-2006-0944", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2006/0944"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406"}, {"name": "17075", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/17075"}, {"name": "23847", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://www.osvdb.org/23847"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/427466/100/0/threaded"}, {"name": "zeroboard-multiple-fields-xss(25212)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25212"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1222", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in zeroboard 4.1 pl7 allows allow remote attackers to inject arbitrary web script or HTML via the (1) memo box title, (2) user email, and (3) homepage fields."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "19214", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19214"}, {"name": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf", "refsource": "MISC", "url": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf"}, {"name": "ADV-2006-0944", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0944"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html"}, {"name": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406", "refsource": "CONFIRM", "url": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406"}, {"name": "17075", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17075"}, {"name": "23847", "refsource": "OSVDB", "url": "http://www.osvdb.org/23847"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/427466/100/0/threaded"}, {"name": "zeroboard-multiple-fields-xss(25212)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25212"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T17:03:28.473Z"}, "title": "CVE Program Container", "references": [{"name": "19214", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/19214"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.inetcop.org/upfiles/33INCSA.2006-0x82-029-zeroboard.pdf"}, {"name": "ADV-2006-0944", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2006/0944"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-March/042872.html"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://www.nzeo.com/bbs/zboard.php?id=cgi_bugreport2&no=5406"}, {"name": "17075", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/17075"}, {"name": "23847", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://www.osvdb.org/23847"}, {"name": "20060312 [INetCop Security Advisory] zeroboard IP session bypass XSS vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/427466/100/0/threaded"}, {"name": "zeroboard-multiple-fields-xss(25212)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25212"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1222", "datePublished": "2006-03-14T11:00:00", "dateReserved": "2006-03-14T00:00:00", "dateUpdated": "2024-08-07T17:03:28.473Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}