{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-04-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple cross-site scripting (XSS) vulnerabilities in Leadhound Full and LITE 2.1, and probably the Network Version \"Full Version\", allow remote attackers to inject arbitrary web script or HTML via the login parameter in (1) agent_affil.pl, (2) agent_help.pl, (3) agent_faq.pl, (4) agent_help_insert.pl, (5) sign_out.pl, (6) members.pl, (7) modify_agent_1.pl, (8) modify_agent_2.pl, (9) modify_agent.pl, (10) agent_links.pl, (11) agent_stats_pending_leads.pl, (12) agent_logoff.pl, (13) agent_rev_det.pl, (14) agent_subaffiliates.pl, (15) agent_stats_pending_leads.pl, (16) agent_transactions.pl, (17) agent_payment_history.pl, (18) agent_summary.pl, (19) agent_camp_all.pl, (20) agent_camp_new.pl, (21) agent_camp_notsub.pl, (22) agent_campaign.pl, (23) agent_camp_expired.pl, (24) agent_stats_det.pl, (25) agent_stats.pl, (26) agent_camp_det.pl, (27) agent_camp_sub.pl, (28) agent_affil_list.pl, and (29) agent_affil_code.pl; the logged parameter in (30) agent_faq.pl, (31) agent_help_insert.pl, (32) members.pl, (33) modify_agent_1.pl, (34) modify_agent_2.pl, (35) modify_agent.pl, (36) agent_links.pl, (37) agent_subaffiliates.pl, (38) agent_stats_pending_leads.pl, (39) agent_transactions.pl, (40) agent_summary.pl, (41) agent_camp_all.pl, (42) agent_camp_new.pl, (43) agent_camp_notsub.pl, (44) agent_campaign.pl, (45) agent_camp_expired.pl, (46) agent_stats.pl, (47) agent_camp_det.pl, (48) agent_camp_sub.pl, (49) agent_affil_list.pl, and (50) agent_affil_code.pl; the camp_id parameter in (51) agent_links.pl, (52) agent_subaffiliates.pl, and (53) agent_camp_det.pl; the (54) banner parameter in agent_links.pl; the offset parameter in (55) agent_links.pl, (56) agent_subaffiliates.pl, (57) agent_transactions.pl, and (58) agent_summary.pl; the date parameter in (59) agent_subaffiliates.pl, (60) agent_transactions.pl, and (61) agent_summary.pl; the dates parameter in (62) agent_rev_det.pl and (63) agent_stats_det.pl; the (64) page parameter in agent_camp_det.pl; the (65) agent_id parameter in agent_commission_statement.pl; and the (66) lost password field in lost_pwd.pl."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2006-05-02T09:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"25030","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25030"},{"name":"25033","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25033"},{"name":"25057","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25057"},{"name":"25037","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25037"},{"name":"25038","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25038"},{"name":"25052","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25052"},{"name":"25035","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25035"},{"name":"25047","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25047"},{"tags":["x_refsource_MISC"],"url":"http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html"},{"name":"25055","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25055"},{"name":"25051","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25051"},{"name":"25042","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25042"},{"name":"25046","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25046"},{"name":"25041","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25041"},{"name":"25048","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25048"},{"name":"25036","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25036"},{"name":"25058","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25058"},{"name":"25043","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25043"},{"name":"19867","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19867"},{"name":"25031","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25031"},{"name":"25054","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25054"},{"name":"25034","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25034"},{"name":"25060","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25060"},{"name":"25050","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25050"},{"name":"25049","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25049"},{"name":"25059","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25059"},{"name":"25053","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25053"},{"name":"25039","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25039"},{"name":"25045","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25045"},{"name":"25032","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25032"},{"name":"25056","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25056"},{"name":"25044","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/25044"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-2063","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple cross-site scripting (XSS) vulnerabilities in Leadhound Full and LITE 2.1, and probably the Network Version \"Full Version\", allow remote attackers to inject arbitrary web script or HTML via the login parameter in (1) agent_affil.pl, (2) agent_help.pl, (3) agent_faq.pl, (4) agent_help_insert.pl, (5) sign_out.pl, (6) members.pl, (7) modify_agent_1.pl, (8) modify_agent_2.pl, (9) modify_agent.pl, (10) agent_links.pl, (11) agent_stats_pending_leads.pl, (12) agent_logoff.pl, (13) agent_rev_det.pl, (14) agent_subaffiliates.pl, (15) agent_stats_pending_leads.pl, (16) agent_transactions.pl, (17) agent_payment_history.pl, (18) agent_summary.pl, (19) agent_camp_all.pl, (20) agent_camp_new.pl, (21) agent_camp_notsub.pl, (22) agent_campaign.pl, (23) agent_camp_expired.pl, (24) agent_stats_det.pl, (25) agent_stats.pl, (26) agent_camp_det.pl, (27) agent_camp_sub.pl, (28) agent_affil_list.pl, and (29) agent_affil_code.pl; the logged parameter in (30) agent_faq.pl, (31) agent_help_insert.pl, (32) members.pl, (33) modify_agent_1.pl, (34) modify_agent_2.pl, (35) modify_agent.pl, (36) agent_links.pl, (37) agent_subaffiliates.pl, (38) agent_stats_pending_leads.pl, (39) agent_transactions.pl, (40) agent_summary.pl, (41) agent_camp_all.pl, (42) agent_camp_new.pl, (43) agent_camp_notsub.pl, (44) agent_campaign.pl, (45) agent_camp_expired.pl, (46) agent_stats.pl, (47) agent_camp_det.pl, (48) agent_camp_sub.pl, (49) agent_affil_list.pl, and (50) agent_affil_code.pl; the camp_id parameter in (51) agent_links.pl, (52) agent_subaffiliates.pl, and (53) agent_camp_det.pl; the (54) banner parameter in agent_links.pl; the offset parameter in (55) agent_links.pl, (56) agent_subaffiliates.pl, (57) agent_transactions.pl, and (58) agent_summary.pl; the date parameter in (59) agent_subaffiliates.pl, (60) agent_transactions.pl, and (61) agent_summary.pl; the dates parameter in (62) agent_rev_det.pl and (63) agent_stats_det.pl; the (64) page parameter in agent_camp_det.pl; the (65) agent_id parameter in agent_commission_statement.pl; and the (66) lost password field in lost_pwd.pl."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"25030","refsource":"OSVDB","url":"http://www.osvdb.org/25030"},{"name":"25033","refsource":"OSVDB","url":"http://www.osvdb.org/25033"},{"name":"25057","refsource":"OSVDB","url":"http://www.osvdb.org/25057"},{"name":"25037","refsource":"OSVDB","url":"http://www.osvdb.org/25037"},{"name":"25038","refsource":"OSVDB","url":"http://www.osvdb.org/25038"},{"name":"25052","refsource":"OSVDB","url":"http://www.osvdb.org/25052"},{"name":"25035","refsource":"OSVDB","url":"http://www.osvdb.org/25035"},{"name":"25047","refsource":"OSVDB","url":"http://www.osvdb.org/25047"},{"name":"http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html","refsource":"MISC","url":"http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html"},{"name":"25055","refsource":"OSVDB","url":"http://www.osvdb.org/25055"},{"name":"25051","refsource":"OSVDB","url":"http://www.osvdb.org/25051"},{"name":"25042","refsource":"OSVDB","url":"http://www.osvdb.org/25042"},{"name":"25046","refsource":"OSVDB","url":"http://www.osvdb.org/25046"},{"name":"25041","refsource":"OSVDB","url":"http://www.osvdb.org/25041"},{"name":"25048","refsource":"OSVDB","url":"http://www.osvdb.org/25048"},{"name":"25036","refsource":"OSVDB","url":"http://www.osvdb.org/25036"},{"name":"25058","refsource":"OSVDB","url":"http://www.osvdb.org/25058"},{"name":"25043","refsource":"OSVDB","url":"http://www.osvdb.org/25043"},{"name":"19867","refsource":"SECUNIA","url":"http://secunia.com/advisories/19867"},{"name":"25031","refsource":"OSVDB","url":"http://www.osvdb.org/25031"},{"name":"25054","refsource":"OSVDB","url":"http://www.osvdb.org/25054"},{"name":"25034","refsource":"OSVDB","url":"http://www.osvdb.org/25034"},{"name":"25060","refsource":"OSVDB","url":"http://www.osvdb.org/25060"},{"name":"25050","refsource":"OSVDB","url":"http://www.osvdb.org/25050"},{"name":"25049","refsource":"OSVDB","url":"http://www.osvdb.org/25049"},{"name":"25059","refsource":"OSVDB","url":"http://www.osvdb.org/25059"},{"name":"25053","refsource":"OSVDB","url":"http://www.osvdb.org/25053"},{"name":"25039","refsource":"OSVDB","url":"http://www.osvdb.org/25039"},{"name":"25045","refsource":"OSVDB","url":"http://www.osvdb.org/25045"},{"name":"25032","refsource":"OSVDB","url":"http://www.osvdb.org/25032"},{"name":"25056","refsource":"OSVDB","url":"http://www.osvdb.org/25056"},{"name":"25044","refsource":"OSVDB","url":"http://www.osvdb.org/25044"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T17:35:31.296Z"},"title":"CVE Program Container","references":[{"name":"25030","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25030"},{"name":"25033","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25033"},{"name":"25057","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25057"},{"name":"25037","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25037"},{"name":"25038","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25038"},{"name":"25052","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25052"},{"name":"25035","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25035"},{"name":"25047","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25047"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://pridels0.blogspot.com/2006/04/leadhound-multiple-vuln.html"},{"name":"25055","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25055"},{"name":"25051","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25051"},{"name":"25042","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25042"},{"name":"25046","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25046"},{"name":"25041","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25041"},{"name":"25048","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25048"},{"name":"25036","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25036"},{"name":"25058","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25058"},{"name":"25043","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25043"},{"name":"19867","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19867"},{"name":"25031","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25031"},{"name":"25054","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25054"},{"name":"25034","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25034"},{"name":"25060","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25060"},{"name":"25050","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25050"},{"name":"25049","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25049"},{"name":"25059","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25059"},{"name":"25053","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25053"},{"name":"25039","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25039"},{"name":"25045","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25045"},{"name":"25032","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25032"},{"name":"25056","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25056"},{"name":"25044","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/25044"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-2063","datePublished":"2006-04-26T20:00:00.000Z","dateReserved":"2006-04-26T00:00:00.000Z","dateUpdated":"2024-08-07T17:35:31.296Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}