CVE-2006-5530

Boesch It-consulting Simpnews < 2.34 - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in Boesch SimpNews before 2.34.01 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to (1) admin/index.php, (2) admin/pwlost.php, and unspecified other files. NOTE: the provenance of this information is unknown; the details are obtained from third party information.

Exploits (2)

exploitdb WORKING POC VERIFIED
by [email protected] · textwebappsphp
https://www.exploit-db.com/exploits/28859
exploitdb WORKING POC VERIFIED
by [email protected] · textwebappsphp
https://www.exploit-db.com/exploits/28858

References (4)

Core 4
Core References
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/20714
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/22535
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4162

Scores

EPSS 0.0046
EPSS Percentile 64.3%

Details

CWE
CWE-79
Status published
Products (4)
boesch_it-consulting/simpnews 2.0.1
boesch_it-consulting/simpnews 2.13
boesch_it-consulting/simpnews 2.30
boesch_it-consulting/simpnews < 2.34
Published Oct 26, 2006
Tracked Since Feb 18, 2026