CVE-2006-2063

Multiple cross-site scripting (XSS) vulnerabilities in Leadhound Full and LITE 2.1, and probably the Network Version "Full Version", allow remote attackers to inject arbitrary web script or HTML via the login parameter in (1) agent_affil.pl, (2) agent_help.pl, (3) agent_faq.pl, (4) agent_help_insert.pl, (5) sign_out.pl, (6) members.pl, (7) modify_agent_1.pl, (8) modify_agent_2.pl, (9) modify_agent.pl, (10) agent_links.pl, (11) agent_stats_pending_leads.pl, (12) agent_logoff.pl, (13) agent_rev_det.pl, (14) agent_subaffiliates.pl, (15) agent_stats_pending_leads.pl, (16) agent_transactions.pl, (17) agent_payment_history.pl, (18) agent_summary.pl, (19) agent_camp_all.pl, (20) agent_camp_new.pl, (21) agent_camp_notsub.pl, (22) agent_campaign.pl, (23) agent_camp_expired.pl, (24) agent_stats_det.pl, (25) agent_stats.pl, (26) agent_camp_det.pl, (27) agent_camp_sub.pl, (28) agent_affil_list.pl, and (29) agent_affil_code.pl; the logged parameter in (30) agent_faq.pl, (31) agent_help_insert.pl, (32) members.pl, (33) modify_agent_1.pl, (34) modify_agent_2.pl, (35) modify_agent.pl, (36) agent_links.pl, (37) agent_subaffiliates.pl, (38) agent_stats_pending_leads.pl, (39) agent_transactions.pl, (40) agent_summary.pl, (41) agent_camp_all.pl, (42) agent_camp_new.pl, (43) agent_camp_notsub.pl, (44) agent_campaign.pl, (45) agent_camp_expired.pl, (46) agent_stats.pl, (47) agent_camp_det.pl, (48) agent_camp_sub.pl, (49) agent_affil_list.pl, and (50) agent_affil_code.pl; the camp_id parameter in (51) agent_links.pl, (52) agent_subaffiliates.pl, and (53) agent_camp_det.pl; the (54) banner parameter in agent_links.pl; the offset parameter in (55) agent_links.pl, (56) agent_subaffiliates.pl, (57) agent_transactions.pl, and (58) agent_summary.pl; the date parameter in (59) agent_subaffiliates.pl, (60) agent_transactions.pl, and (61) agent_summary.pl; the dates parameter in (62) agent_rev_det.pl and (63) agent_stats_det.pl; the (64) page parameter in agent_camp_det.pl; the (65) agent_id parameter in agent_commission_statement.pl; and the (66) lost password field in lost_pwd.pl.
References
Link Resource
http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html
http://secunia.com/advisories/19867 Vendor Advisory
http://www.osvdb.org/25030 Exploit
http://www.osvdb.org/25031 Exploit
http://www.osvdb.org/25032 Exploit
http://www.osvdb.org/25033 Exploit
http://www.osvdb.org/25034
http://www.osvdb.org/25035 Exploit
http://www.osvdb.org/25036 Exploit
http://www.osvdb.org/25037 Exploit
http://www.osvdb.org/25038 Exploit
http://www.osvdb.org/25039 Exploit
http://www.osvdb.org/25041 Exploit
http://www.osvdb.org/25042 Exploit
http://www.osvdb.org/25043 Exploit
http://www.osvdb.org/25044 Exploit
http://www.osvdb.org/25045 Exploit
http://www.osvdb.org/25046 Exploit
http://www.osvdb.org/25047 Exploit
http://www.osvdb.org/25048 Exploit
http://www.osvdb.org/25049 Exploit
http://www.osvdb.org/25050 Exploit
http://www.osvdb.org/25051 Exploit
http://www.osvdb.org/25052 Exploit
http://www.osvdb.org/25053 Exploit
http://www.osvdb.org/25054 Exploit
http://www.osvdb.org/25055 Exploit
http://www.osvdb.org/25056 Exploit
http://www.osvdb.org/25057 Exploit
http://www.osvdb.org/25058 Exploit
http://www.osvdb.org/25059 Exploit
http://www.osvdb.org/25060 Exploit
http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html
http://secunia.com/advisories/19867 Vendor Advisory
http://www.osvdb.org/25030 Exploit
http://www.osvdb.org/25031 Exploit
http://www.osvdb.org/25032 Exploit
http://www.osvdb.org/25033 Exploit
http://www.osvdb.org/25034
http://www.osvdb.org/25035 Exploit
http://www.osvdb.org/25036 Exploit
http://www.osvdb.org/25037 Exploit
http://www.osvdb.org/25038 Exploit
http://www.osvdb.org/25039 Exploit
http://www.osvdb.org/25041 Exploit
http://www.osvdb.org/25042 Exploit
http://www.osvdb.org/25043 Exploit
http://www.osvdb.org/25044 Exploit
http://www.osvdb.org/25045 Exploit
http://www.osvdb.org/25046 Exploit
http://www.osvdb.org/25047 Exploit
http://www.osvdb.org/25048 Exploit
http://www.osvdb.org/25049 Exploit
http://www.osvdb.org/25050 Exploit
http://www.osvdb.org/25051 Exploit
http://www.osvdb.org/25052 Exploit
http://www.osvdb.org/25053 Exploit
http://www.osvdb.org/25054 Exploit
http://www.osvdb.org/25055 Exploit
http://www.osvdb.org/25056 Exploit
http://www.osvdb.org/25057 Exploit
http://www.osvdb.org/25058 Exploit
http://www.osvdb.org/25059 Exploit
http://www.osvdb.org/25060 Exploit
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:leadhound_network:leadhound_full:2.1:*:*:*:*:*:*:*
cpe:2.3:a:leadhound_network:leadhound_full:2.1_network_version:*:*:*:*:*:*:*
cpe:2.3:a:leadhound_network:leadhound_lite:2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html - () http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html -
References () http://secunia.com/advisories/19867 - Vendor Advisory () http://secunia.com/advisories/19867 - Vendor Advisory
References () http://www.osvdb.org/25030 - Exploit () http://www.osvdb.org/25030 - Exploit
References () http://www.osvdb.org/25031 - Exploit () http://www.osvdb.org/25031 - Exploit
References () http://www.osvdb.org/25032 - Exploit () http://www.osvdb.org/25032 - Exploit
References () http://www.osvdb.org/25033 - Exploit () http://www.osvdb.org/25033 - Exploit
References () http://www.osvdb.org/25034 - () http://www.osvdb.org/25034 -
References () http://www.osvdb.org/25035 - Exploit () http://www.osvdb.org/25035 - Exploit
References () http://www.osvdb.org/25036 - Exploit () http://www.osvdb.org/25036 - Exploit
References () http://www.osvdb.org/25037 - Exploit () http://www.osvdb.org/25037 - Exploit
References () http://www.osvdb.org/25038 - Exploit () http://www.osvdb.org/25038 - Exploit
References () http://www.osvdb.org/25039 - Exploit () http://www.osvdb.org/25039 - Exploit
References () http://www.osvdb.org/25041 - Exploit () http://www.osvdb.org/25041 - Exploit
References () http://www.osvdb.org/25042 - Exploit () http://www.osvdb.org/25042 - Exploit
References () http://www.osvdb.org/25043 - Exploit () http://www.osvdb.org/25043 - Exploit
References () http://www.osvdb.org/25044 - Exploit () http://www.osvdb.org/25044 - Exploit
References () http://www.osvdb.org/25045 - Exploit () http://www.osvdb.org/25045 - Exploit
References () http://www.osvdb.org/25046 - Exploit () http://www.osvdb.org/25046 - Exploit
References () http://www.osvdb.org/25047 - Exploit () http://www.osvdb.org/25047 - Exploit
References () http://www.osvdb.org/25048 - Exploit () http://www.osvdb.org/25048 - Exploit
References () http://www.osvdb.org/25049 - Exploit () http://www.osvdb.org/25049 - Exploit
References () http://www.osvdb.org/25050 - Exploit () http://www.osvdb.org/25050 - Exploit
References () http://www.osvdb.org/25051 - Exploit () http://www.osvdb.org/25051 - Exploit
References () http://www.osvdb.org/25052 - Exploit () http://www.osvdb.org/25052 - Exploit
References () http://www.osvdb.org/25053 - Exploit () http://www.osvdb.org/25053 - Exploit
References () http://www.osvdb.org/25054 - Exploit () http://www.osvdb.org/25054 - Exploit
References () http://www.osvdb.org/25055 - Exploit () http://www.osvdb.org/25055 - Exploit
References () http://www.osvdb.org/25056 - Exploit () http://www.osvdb.org/25056 - Exploit
References () http://www.osvdb.org/25057 - Exploit () http://www.osvdb.org/25057 - Exploit
References () http://www.osvdb.org/25058 - Exploit () http://www.osvdb.org/25058 - Exploit
References () http://www.osvdb.org/25059 - Exploit () http://www.osvdb.org/25059 - Exploit
References () http://www.osvdb.org/25060 - Exploit () http://www.osvdb.org/25060 - Exploit

Information

Published : 2006-04-26 20:06

Updated : 2025-04-03 01:03


NVD link : CVE-2006-2063

Mitre link : CVE-2006-2063

CVE.ORG link : CVE-2006-2063


JSON object : View

Products Affected

leadhound_network

  • leadhound_lite
  • leadhound_full