{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T04:33:57.881","vulnerabilities":[{"cve":{"id":"CVE-2006-3767","sourceIdentifier":"cve@mitre.org","published":"2006-07-21T14:03:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting (XSS) vulnerability in showprofile.php in Darren's $5 Script Archive osDate 1.1.7 and earlier allows remote attackers to inject arbitrary web script or HTML via the onerror attribute in an HTML IMG tag with a non-existent source file in txtcomment parameter, which is used when posting a comment."},{"lang":"es","value":"Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en showprofile.php de Darren's $5 Script Archive osDate 1.1.7 y versiones anteriores permite a atacantes remotos inyectar scripts web o HTML de su elección mediante el atributo onerror en una etiqueta HTML IMG con un fichero fuente no existente en el parámetro txtcomment, que se usa cuando se envía un comentario."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.7","matchCriteriaId":"6CD67698-6969-4491-8817-84FC7720F1C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"306B87FA-57F1-4E2B-A87D-D4BD4CA20C6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"A61D1005-948D-4F09-B640-0490322712C1"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2006-08/0285.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/21103","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1016700","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/440490/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/440592/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/19034","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/2864","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27814","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2006-08/0285.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/21103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1016700","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/440490/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/440592/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/19034","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/2864","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27814","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}