{"api_version":"1","generated_at":"2026-05-11T20:55:13+00:00","cve":"CVE-2006-2351","urls":{"html":"https://cve.report/CVE-2006-2351","api":"https://cve.report/api/cve/CVE-2006-2351.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2351","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2351"},"summary":{"title":"CVE-2006-2351","description":"Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via the (1) sDeviceView or (2) nDeviceID parameter to (a) NmConsole/Navigation.asp or (3) sHostname parameter to (b) NmConsole/ToolResults.asp.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2006-05-15 10:02:00","updated_at":"2017-07-20 01:31:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"http://www.osvdb.org/25470","name":"25470","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://secunia.com/advisories/20075","name":"20075","refsource":"SECUNIA","tags":["Exploit","Vendor Advisory"],"title":"WhatsUp Professional Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/17964","name":"17964","refsource":"BID","tags":["Exploit"],"title":"Ipswitch WhatsUp Professional Multiple Input Validation Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/1787","name":"ADV-2006-1787","refsource":"VUPEN","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/433808","name":"20060511 Ipswitch WhatsUp Professional multiple flaws","refsource":"BUGTRAQ","tags":["Exploit","Vendor Advisory"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26500","name":"whatsup-navigation-toolresults-xss(26500)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/897","name":"897","refsource":"SREASON","tags":[],"title":"Ipswitch WhatsUp Professional multiple flaws - CXSecurity.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/25469","name":"25469","refsource":"OSVDB","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2351","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2351","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2351","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_professional","cpe6":"2006","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2351","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_professional","cpe6":"2006_premium","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2351","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_professional","cpe6":"2006","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"2351","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_professional","cpe6":"2006_premium","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2351","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via the (1) sDeviceView or (2) nDeviceID parameter to (a) NmConsole/Navigation.asp or (3) sHostname parameter to (b) NmConsole/ToolResults.asp."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"25469","refsource":"OSVDB","url":"http://www.osvdb.org/25469"},{"name":"20060511 Ipswitch WhatsUp Professional multiple flaws","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/433808"},{"name":"20075","refsource":"SECUNIA","url":"http://secunia.com/advisories/20075"},{"name":"whatsup-navigation-toolresults-xss(26500)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26500"},{"name":"ADV-2006-1787","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/1787"},{"name":"17964","refsource":"BID","url":"http://www.securityfocus.com/bid/17964"},{"name":"897","refsource":"SREASON","url":"http://securityreason.com/securityalert/897"},{"name":"25470","refsource":"OSVDB","url":"http://www.osvdb.org/25470"}]}},"nvd":{"publishedDate":"2006-05-15 10:02:00","lastModifiedDate":"2017-07-20 01:31:00","problem_types":["CWE-79"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ipswitch:whatsup_professional:2006_premium:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ipswitch:whatsup_professional:2006:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2351","Ordinal":"17658","Title":"CVE-2006-2351","CVE":"CVE-2006-2351","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2351","Ordinal":"1","NoteData":"Multiple cross-site scripting (XSS) vulnerabilities in IPswitch WhatsUp Professional 2006 and WhatsUp Professional 2006 Premium allow remote attackers to inject arbitrary web script or HTML via the (1) sDeviceView or (2) nDeviceID parameter to (a) NmConsole/Navigation.asp or (3) sHostname parameter to (b) NmConsole/ToolResults.asp.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"2351","Ordinal":"2","NoteData":"2006-05-15","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2351","Ordinal":"3","NoteData":"2017-07-19","Type":"Other","Title":"Modified"}]}}}