Show plain JSON{"id": "CVE-2006-5770", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2006-11-06T23:07:00.000", "references": [{"url": "http://www.osvdb.org/32046", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32047", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32048", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32049", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32050", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32051", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/450496/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/20895", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30007", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/32046", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/32047", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/32048", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/32049", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/32050", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/32051", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/450496/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/20895", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30007", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in ac4p Mobile allow remote attackers to inject arbitrary web script or HTML via (1) Bloks, (2) Newnews, (3) lBlok, and (4) foooot parameter in (a) index.php; Newnews, (5) newmsgs, and Bloks parameter in (b) MobileNews.php; Newnews parameter in (c) polls.php; (6) cats parameter in (d) send.php; (7) footer parameter in (e) up.php; and (8) pagenav parameter in (f) cp/index.php."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en ac4p Mobile permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante los par\u00e1metros (1) Bloks, (2) Newnews, (3) lBlok, y (4) foooot en (a) index.php; los par\u00e1metros Newnews, (5) newmsgs, y Bloks en (b) MobileNews.php; el par\u00e1metro NEwnews en (c) polls.php; el par\u00e1metro (6) cats en (d) send.php; el par\u00e1metro (7) footer en (e) up.php; y el par\u00e1metro (8) pagenav en (f) cp/index.php."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:ac4p:ac4p_mobile:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E8DE135-AEA1-4897-AAD9-14B0401DC8BA"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}