Vulnerability Description
Cross-site scripting (XSS) vulnerability in guestbook.php in Soren Boysen (SkullSplitter) PHP Guestbook 2.6 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Skullsplitter | Php Guestbook | <= 2.6 |
References
- http://attrition.org/pipermail/vim/2006-March/000613.html
- http://evuln.com/vulns/104/summary.htmlPatch
- http://secunia.com/advisories/19268PatchVendor Advisory
- http://securityreason.com/securityalert/650
- http://www.boysen.be/en/Patch
- http://www.osvdb.org/23941
- http://www.securityfocus.com/archive/1/429254/100/0/threaded
- http://www.securityfocus.com/bid/17136Patch
- http://www.vupen.com/english/advisories/2006/0974
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25293
- http://attrition.org/pipermail/vim/2006-March/000613.html
- http://evuln.com/vulns/104/summary.htmlPatch
- http://secunia.com/advisories/19268PatchVendor Advisory
- http://securityreason.com/securityalert/650
- http://www.boysen.be/en/Patch
FAQ
What is CVE-2006-1256?
CVE-2006-1256 is a vulnerability with a CVSS score of 2.6 (LOW). Cross-site scripting (XSS) vulnerability in guestbook.php in Soren Boysen (SkullSplitter) PHP Guestbook 2.6 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
How severe is CVE-2006-1256?
CVE-2006-1256 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1256?
Check the references section above for vendor advisories and patch information. Affected products include: Skullsplitter Php Guestbook.