{"api_version":"1","generated_at":"2026-05-02T21:49:23+00:00","cve":"CVE-2006-2109","urls":{"html":"https://cve.report/CVE-2006-2109","api":"https://cve.report/api/cve/CVE-2006-2109.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2109","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2109"},"summary":{"title":"CVE-2006-2109","description":"Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-05-02 10:02:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.8","severity":"","vector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/19937","name":"http://secunia.com/advisories/19937","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"JSBoard \"table\" Cross-Site Scripting Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26211","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26211","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/432714/100/0/threaded","name":"http://www.securityfocus.com/archive/1/432714/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/1636","name":"http://www.vupen.com/english/advisories/2006/1636","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25222","name":"http://www.osvdb.org/25222","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt","name":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"404 Not Found","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17778","name":"http://www.securityfocus.com/bid/17778","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"JSBoard Login.PHP Cross-Site Scripting Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2109","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2109","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2109","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jsboard","cpe5":"jsboard","cpe6":"2.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2109","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jsboard","cpe5":"jsboard","cpe6":"2.0.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2109","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jsboard","cpe5":"jsboard","cpe6":"2.0.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2109","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jsboard","cpe5":"jsboard","cpe6":"2.0.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2109","vulnerable":"1","versionEndIncluding":"2.0.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jsboard","cpe5":"jsboard","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"2109","cve":"CVE-2006-2109","epss":"0.071010000","percentile":"0.915480000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:35:31.596Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"jsboard-login-xss(26211)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26211"},{"name":"19937","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19937"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt"},{"name":"17778","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/17778"},{"name":"20060502 JSBoard XSS vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/432714/100/0/threaded"},{"name":"ADV-2006-1636","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/1636"},{"name":"25222","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25222"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-02T00:00:00.000Z","descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-18T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"jsboard-login-xss(26211)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26211"},{"name":"19937","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19937"},{"tags":["x_refsource_MISC"],"url":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt"},{"name":"17778","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/17778"},{"name":"20060502 JSBoard XSS vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/432714/100/0/threaded"},{"name":"ADV-2006-1636","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/1636"},{"name":"25222","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25222"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2109","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"jsboard-login-xss(26211)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26211"},{"name":"19937","refsource":"SECUNIA","url":"http://secunia.com/advisories/19937"},{"name":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt","refsource":"MISC","url":"https://www.klink.name/security/aklink-sa-2006-001-jsboard-xss.txt"},{"name":"17778","refsource":"BID","url":"http://www.securityfocus.com/bid/17778"},{"name":"20060502 JSBoard XSS vulnerability","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/432714/100/0/threaded"},{"name":"ADV-2006-1636","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1636"},{"name":"25222","refsource":"OSVDB","url":"http://www.osvdb.org/25222"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-2109","datePublished":"2006-05-02T10:00:00.000Z","dateReserved":"2006-05-01T00:00:00.000Z","dateUpdated":"2024-08-07T17:35:31.596Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-05-02 10:02:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jsboard:jsboard:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.11","matchCriteriaId":"97672C81-9E3E-44FC-860F-4F9828E200C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:jsboard:jsboard:2.0.7:*:*:*:*:*:*:*","matchCriteriaId":"B67EEA77-8166-4F5A-8C3F-0405EE7A6761"},{"vulnerable":true,"criteria":"cpe:2.3:a:jsboard:jsboard:2.0.8:*:*:*:*:*:*:*","matchCriteriaId":"E37ED4D7-A553-4D37-9B46-0F8D7802A466"},{"vulnerable":true,"criteria":"cpe:2.3:a:jsboard:jsboard:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"C2DD6C73-07BA-4576-971F-37976C38053A"},{"vulnerable":true,"criteria":"cpe:2.3:a:jsboard:jsboard:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"C51965A7-0D08-419D-9411-AC7CE29E2146"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2109","Ordinal":"1","Title":"CVE-2006-2109","CVE":"CVE-2006-2109","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2109","Ordinal":"1","NoteData":"Cross-site scripting (XSS) vulnerability in the parse_query_str function in include/print.php in JSBoard 2.0.10 and 2.0.11, and possibly other versions before 2.0.12, allows remote attackers to inject arbitrary web script or HTML via parameters that are set as global variables within the program, as demonstrated using the table parameter to login.php.","Type":"Description","Title":"CVE-2006-2109"},{"CveYear":"2006","CveId":"2109","Ordinal":"2","NoteData":"2006-05-02","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2109","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}