Vulnerability Description
Cross-site scripting (XSS) vulnerability in export_handler.php in WebCalendar 1.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the format parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Webcalendar | Webcalendar | 1.0.4 |
References
- http://secunia.com/advisories/23341Vendor Advisory
- http://secunia.com/advisories/24974
- http://securityreason.com/securityalert/2054
- http://www.debian.org/security/2007/dsa-1279
- http://www.securityfocus.com/archive/1/454810/100/0/threaded
- http://www.vupen.com/english/advisories/2006/5067
- http://secunia.com/advisories/23341Vendor Advisory
- http://secunia.com/advisories/24974
- http://securityreason.com/securityalert/2054
- http://www.debian.org/security/2007/dsa-1279
- http://www.securityfocus.com/archive/1/454810/100/0/threaded
- http://www.vupen.com/english/advisories/2006/5067
FAQ
What is CVE-2006-6669?
CVE-2006-6669 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Cross-site scripting (XSS) vulnerability in export_handler.php in WebCalendar 1.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the format parameter.
How severe is CVE-2006-6669?
CVE-2006-6669 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6669?
Check the references section above for vendor advisories and patch information. Affected products include: Webcalendar Webcalendar.