CVE-2006-0682 : Detail

CVE-2006-0682

0.44%V3
Network
2006-02-14
23h00 +00:00
2017-07-19
13h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple cross-site scripting (XSS) vulnerabilities in bbcodes system in e107 before 0.7.2 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

E107>>E107 >> Version 0.7

E107>>E107 >> Version 0.7.1

E107>>E107 >> Version 0.547_beta

    E107>>E107 >> Version 0.548_beta

      E107>>E107 >> Version 0.549_beta

        E107>>E107 >> Version 0.551_beta

          E107>>E107 >> Version 0.552_beta

            E107>>E107 >> Version 0.553_beta

              E107>>E107 >> Version 0.554_beta

                E107>>E107 >> Version 0.555_beta

                  E107>>E107 >> Version 0.600

                  E107>>E107 >> Version 0.601

                  E107>>E107 >> Version 0.602

                  E107>>E107 >> Version 0.603

                  E107>>E107 >> Version 0.604

                  E107>>E107 >> Version 0.605

                  E107>>E107 >> Version 0.606

                  E107>>E107 >> Version 0.607

                  E107>>E107 >> Version 0.608

                  E107>>E107 >> Version 0.609

                  E107>>E107 >> Version 0.610

                  E107>>E107 >> Version 0.611

                  E107>>E107 >> Version 0.612

                  E107>>E107 >> Version 0.613

                  E107>>E107 >> Version 0.614

                  E107>>E107 >> Version 0.615

                  E107>>E107 >> Version 0.615a

                  E107>>E107 >> Version 0.616

                  E107>>E107 >> Version 0.617

                  E107>>E107 >> Version 0.6171

                  E107>>E107 >> Version 0.6172

                  E107>>E107 >> Version 0.6173

                  E107>>E107 >> Version 0.6174

                  E107>>E107 >> Version 0.6175

                  E107>>E107 >> Version 5.1

                    E107>>E107 >> Version 5.2

                      E107>>E107 >> Version 5.3_beta

                        E107>>E107 >> Version 5.3_beta2

                          E107>>E107 >> Version 5.04

                            E107>>E107 >> Version 5.4_beta1

                              E107>>E107 >> Version 5.4_beta3

                                E107>>E107 >> Version 5.4_beta4

                                  E107>>E107 >> Version 5.4_beta5

                                    E107>>E107 >> Version 5.4_beta6

                                      E107>>E107 >> Version 5.05

                                        References

                                        http://www.securityfocus.com/bid/16614
                                        Tags : vdb-entry, x_refsource_BID
                                        http://www.vupen.com/english/advisories/2006/0540
                                        Tags : vdb-entry, x_refsource_VUPEN
                                        http://secunia.com/advisories/18816
                                        Tags : third-party-advisory, x_refsource_SECUNIA