First published: Tue Mar 28 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in WebAPP 0.9.9.3.2 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) action, (2) id, (3) num, (4) board, (5) cat, (6) real, (7) viewcat, (8) img, or (9) curcatname parameter in cgi-bin/index.cgi, or (10) vsSD parameter in /mods/calendar/index.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WebAPP | =0.9.9.3 | |
WebAPP | =0.9.9.3.2 | |
WebAPP | =0.9.9.2.1 | |
WebAPP | =0.9.9.2 | |
WebAPP | =0.9.9.1 | |
WebAPP | =0.9.9.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1427 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary scripts on affected WebAPP installations.
To fix CVE-2006-1427, upgrade to the latest version of WebAPP that contains patches for these cross-site scripting vulnerabilities.
CVE-2006-1427 affects WebAPP versions 0.9.9.3.2 and earlier, including 0.9.9.3, 0.9.9.3.1, 0.9.9.2, and 0.9.9.1.
CVE-2006-1427 exposes users to risks by allowing attackers to inject malicious web scripts through various parameters, potentially leading to data theft or session hijacking.
Yes, CVE-2006-1427 can be exploited without user interaction, making it a serious threat for users visiting compromised or malicious sites.