Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in register.php in Tritanium Bulletin Board (TBB) 1.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) newuser_realname and (2) newuser_icq parameters, a different vector than CVE-2006-1768. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tritanium Scripts | Tritanium Bulletin Board | <= 1.2.3 |
References
- http://secunia.com/advisories/19635Vendor Advisory
- http://securityreason.com/securityalert/693
- http://www.osvdb.org/24556
- http://www.vupen.com/english/advisories/2006/1329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25751
- http://secunia.com/advisories/19635Vendor Advisory
- http://securityreason.com/securityalert/693
- http://www.osvdb.org/24556
- http://www.vupen.com/english/advisories/2006/1329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25751
FAQ
What is CVE-2006-1815?
CVE-2006-1815 is a vulnerability with a CVSS score of 2.6 (LOW). Multiple cross-site scripting (XSS) vulnerabilities in register.php in Tritanium Bulletin Board (TBB) 1.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) newuser_realname a...
How severe is CVE-2006-1815?
CVE-2006-1815 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1815?
Check the references section above for vendor advisories and patch information. Affected products include: Tritanium Scripts Tritanium Bulletin Board.