CVE-2006-3312

N/A Unknown
Published: June 29, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in ashmans and Bill Echlin QaTraq 6.5 RC and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) link_print, (2) link_upgrade, (3) link_sql, (4) link_next, (5) link_prev, and (6) link_list parameters in top.inc as included by queries_view_search.php; the (7) msg, (8) component_name, and (9) component_desc parameters in (a) components_copy_content.php, (b) components_modify_content.php, and (c) components_new_content.php; the (10) title, (11) version, and (12) content parameters in design_copy_content.php; the (13) plan_title and (14) plan_content parameters in design_copy_plan_search.php; the (15) title, (16) minor_version, (17) new_version, and (18) content parameters in design_modify_content.php; the (19) title, (20) version, and (21) content parameters in design_new_content.php; the (22) plan_name and (23) plan_desc parameters in design_new_search.php; the (24) file_name parameter in download.php; the (25) username and (26) password parameters in login.php; the (27) title, (28) version, and (29) content parameters in phase_copy_content.php; the (30) content parameter in phase_delete_search.php; the (31) title, (32) minor_version, (33) new_version, and (34) content parameters in phase_modify_content.php; the (35) content, (36) title, (37) version, and (38) content parameters in phase_modify_search.php; the (39) content parameter in phase_view_search.php; the (40) msg, (41) product_name, and (42) product_desc parameters in products_copy_content.php; and possibly the (43) product_name and (44) product_desc parameters in (d) products_copy_search.php, and a large number of additional parameters and executables. NOTE: the vendor notified CVE via e-mail that this issue has been fixed in the 6.8 RC release.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.osvdb.org/27599
Source: cve@mitre.org
http://www.osvdb.org/27600
Source: cve@mitre.org
http://www.osvdb.org/27601
Source: cve@mitre.org
http://www.osvdb.org/27602
Source: cve@mitre.org
http://www.osvdb.org/27603
Source: cve@mitre.org
http://www.osvdb.org/27604
Source: cve@mitre.org
http://www.osvdb.org/27605
Source: cve@mitre.org
http://www.osvdb.org/27606
Source: cve@mitre.org
http://www.osvdb.org/27607
Source: cve@mitre.org
http://www.osvdb.org/27608
Source: cve@mitre.org
http://www.osvdb.org/27609
Source: cve@mitre.org
http://www.osvdb.org/27610
Source: cve@mitre.org
http://www.osvdb.org/27611
Source: cve@mitre.org
http://www.osvdb.org/27612
Source: cve@mitre.org
http://www.osvdb.org/27613
Source: cve@mitre.org
http://www.osvdb.org/27614
Source: cve@mitre.org
http://www.osvdb.org/27615
Source: cve@mitre.org
http://www.osvdb.org/27616
Source: cve@mitre.org
http://www.testmanagement.com/
Source: cve@mitre.org
http://seclab.tuwien.ac.at/advisories/TUVSA-0606-001.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://securityreason.com/securityalert/1169
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016381
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.attrition.org/pipermail/vim/2006-August/000969.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27599
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27600
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27601
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27602
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27603
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27604
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27605
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27606
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27607
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27608
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27609
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27610
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27611
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27612
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27613
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27614
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27615
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27616
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/438151/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18620
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.testmanagement.com/
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27355
Source: af854a3a-2127-422b-91ae-364da2661108

52 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.9%
86th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

qatraq