{"api_version":"1","generated_at":"2026-05-13T10:06:36+00:00","cve":"CVE-2006-3586","urls":{"html":"https://cve.report/CVE-2006-3586","api":"https://cve.report/api/cve/CVE-2006-3586.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-3586","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-3586"},"summary":{"title":"CVE-2006-3586","description":"SQL injection vulnerability in Jetbox CMS 2.1 SR1 allows remote attackers to execute arbitrary SQL commands via the (1) frontsession COOKIE parameter and (2) view parameter in index.php, and the (3) login parameter in admin/cms/index.php.","state":"PUBLIC","assigner":"PSIRT-CNA@flexerasoftware.com","published_at":"2006-08-08 23:04:00","updated_at":"2018-10-18 16:48:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28168","name":"jetboxcms-index-sql-injection(28168)","refsource":"XF","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/441980/100/0/threaded","name":"20060802 Secunia Research: Jetbox Multiple Vulnerabilities","refsource":"BUGTRAQ","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/1339","name":"1339","refsource":"SREASON","tags":[],"title":"SecurityReason - Jetbox Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/19303","name":"19303","refsource":"BID","tags":[],"title":"Jetbox Multiple Input Validation Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/20889","name":"20889","refsource":"SECUNIA","tags":["Vendor Advisory"],"title":"Jetbox CMS Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2006-57/advisory/","name":"http://secunia.com/secunia_research/2006-57/advisory/","refsource":"MISC","tags":["Vendor Advisory"],"title":"About Secunia Research | Flexera","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-3586","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-3586","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"3586","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbox","cpe5":"jetbox_cms","cpe6":"2.1_sr1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"3586","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"jetbox","cpe5":"jetbox_cms","cpe6":"2.1_sr1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2006-3586","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SQL injection vulnerability in Jetbox CMS 2.1 SR1 allows remote attackers to execute arbitrary SQL commands via the (1) frontsession COOKIE parameter and (2) view parameter in index.php, and the (3) login parameter in admin/cms/index.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"jetboxcms-index-sql-injection(28168)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28168"},{"name":"19303","refsource":"BID","url":"http://www.securityfocus.com/bid/19303"},{"name":"20060802 Secunia Research: Jetbox Multiple Vulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/441980/100/0/threaded"},{"name":"1339","refsource":"SREASON","url":"http://securityreason.com/securityalert/1339"},{"name":"http://secunia.com/secunia_research/2006-57/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2006-57/advisory/"},{"name":"20889","refsource":"SECUNIA","url":"http://secunia.com/advisories/20889"}]}},"nvd":{"publishedDate":"2006-08-08 23:04:00","lastModifiedDate":"2018-10-18 16:48:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:jetbox:jetbox_cms:2.1_sr1:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"3586","Ordinal":"18912","Title":"CVE-2006-3586","CVE":"CVE-2006-3586","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"3586","Ordinal":"1","NoteData":"SQL injection vulnerability in Jetbox CMS 2.1 SR1 allows remote attackers to execute arbitrary SQL commands via the (1) frontsession COOKIE parameter and (2) view parameter in index.php, and the (3) login parameter in admin/cms/index.php.","Type":"Description","Title":null},{"CveYear":"2006","CveId":"3586","Ordinal":"2","NoteData":"2006-08-08","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"3586","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}