Show plain JSON{"id": "CVE-2006-1796", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2006-04-17T20:06:00.000", "references": [{"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://trac.wordpress.org/ticket/1686", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://trac.wordpress.org/ticket/1686", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI'])."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A77B148-B3ED-4B75-9077-0F974365DA64", "versionEndIncluding": "2.0"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3C33D37-2FFF-4DE5-B260-E090F4E6377B"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4139FE-7C43-44AC-856F-226E1194D936"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0395AD1D-3470-49EE-9F2A-349EF8782B40"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC"}, {"criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "The vulnerability manifests itself only when viewed by IE.\r\nThis vulnerability is addressed in the following product release:\r\nWordpress 2.0.1-1"}