Vulnerability Details CVE-2006-7196
Cross-site scripting (XSS) vulnerability in the calendar application example in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.15 allows remote attackers to inject arbitrary web script or HTML via the time parameter to cal2.jsp and possibly unspecified other vectors. NOTE: this may be related to CVE-2006-0254.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.766
EPSS Ranking 98.9%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2006-7196
-
cpe:2.3:a:apache:tomcat:-
-
cpe:2.3:a:apache:tomcat:1.1.3
-
cpe:2.3:a:apache:tomcat:3.0
-
cpe:2.3:a:apache:tomcat:3.1
-
cpe:2.3:a:apache:tomcat:3.1.1
-
cpe:2.3:a:apache:tomcat:3.2
-
cpe:2.3:a:apache:tomcat:3.2.1
-
cpe:2.3:a:apache:tomcat:3.2.2
-
cpe:2.3:a:apache:tomcat:3.2.3
-
cpe:2.3:a:apache:tomcat:3.2.4
-
cpe:2.3:a:apache:tomcat:3.3
-
cpe:2.3:a:apache:tomcat:3.3.1
-
cpe:2.3:a:apache:tomcat:3.3.1a
-
cpe:2.3:a:apache:tomcat:3.3.2
-
cpe:2.3:a:apache:tomcat:4
-
cpe:2.3:a:apache:tomcat:4.0.0
-
cpe:2.3:a:apache:tomcat:4.0.1
-
cpe:2.3:a:apache:tomcat:4.0.2
-
cpe:2.3:a:apache:tomcat:4.0.3
-
cpe:2.3:a:apache:tomcat:4.0.4
-
cpe:2.3:a:apache:tomcat:4.0.5
-
cpe:2.3:a:apache:tomcat:4.0.6
-
cpe:2.3:a:apache:tomcat:4.1.0
-
cpe:2.3:a:apache:tomcat:4.1.1
-
cpe:2.3:a:apache:tomcat:4.1.10
-
cpe:2.3:a:apache:tomcat:4.1.11
-
cpe:2.3:a:apache:tomcat:4.1.12
-
cpe:2.3:a:apache:tomcat:4.1.13
-
cpe:2.3:a:apache:tomcat:4.1.14
-
cpe:2.3:a:apache:tomcat:4.1.15
-
cpe:2.3:a:apache:tomcat:4.1.16
-
cpe:2.3:a:apache:tomcat:4.1.17
-
cpe:2.3:a:apache:tomcat:4.1.18
-
cpe:2.3:a:apache:tomcat:4.1.19
-
cpe:2.3:a:apache:tomcat:4.1.2
-
cpe:2.3:a:apache:tomcat:4.1.20
-
cpe:2.3:a:apache:tomcat:4.1.21
-
cpe:2.3:a:apache:tomcat:4.1.22
-
cpe:2.3:a:apache:tomcat:4.1.23
-
cpe:2.3:a:apache:tomcat:4.1.24
-
cpe:2.3:a:apache:tomcat:4.1.25
-
cpe:2.3:a:apache:tomcat:4.1.26
-
cpe:2.3:a:apache:tomcat:4.1.27
-
cpe:2.3:a:apache:tomcat:4.1.28
-
cpe:2.3:a:apache:tomcat:4.1.29
-
cpe:2.3:a:apache:tomcat:4.1.3
-
cpe:2.3:a:apache:tomcat:4.1.30
-
cpe:2.3:a:apache:tomcat:4.1.31
-
cpe:2.3:a:apache:tomcat:4.1.4
-
cpe:2.3:a:apache:tomcat:4.1.5
-
cpe:2.3:a:apache:tomcat:4.1.6
-
cpe:2.3:a:apache:tomcat:4.1.8
-
cpe:2.3:a:apache:tomcat:4.1.9
-
cpe:2.3:a:apache:tomcat:5.0.0
-
cpe:2.3:a:apache:tomcat:5.0.1
-
cpe:2.3:a:apache:tomcat:5.0.10
-
cpe:2.3:a:apache:tomcat:5.0.11
-
cpe:2.3:a:apache:tomcat:5.0.12
-
cpe:2.3:a:apache:tomcat:5.0.13
-
cpe:2.3:a:apache:tomcat:5.0.14
-
cpe:2.3:a:apache:tomcat:5.0.15
-
cpe:2.3:a:apache:tomcat:5.0.16
-
cpe:2.3:a:apache:tomcat:5.0.17
-
cpe:2.3:a:apache:tomcat:5.0.18
-
cpe:2.3:a:apache:tomcat:5.0.19
-
cpe:2.3:a:apache:tomcat:5.0.2
-
cpe:2.3:a:apache:tomcat:5.0.21
-
cpe:2.3:a:apache:tomcat:5.0.22
-
cpe:2.3:a:apache:tomcat:5.0.23
-
cpe:2.3:a:apache:tomcat:5.0.24
-
cpe:2.3:a:apache:tomcat:5.0.25
-
cpe:2.3:a:apache:tomcat:5.0.26
-
cpe:2.3:a:apache:tomcat:5.0.27
-
cpe:2.3:a:apache:tomcat:5.0.28
-
cpe:2.3:a:apache:tomcat:5.0.29
-
cpe:2.3:a:apache:tomcat:5.0.3
-
cpe:2.3:a:apache:tomcat:5.0.30
-
cpe:2.3:a:apache:tomcat:5.0.4
-
cpe:2.3:a:apache:tomcat:5.0.5
-
cpe:2.3:a:apache:tomcat:5.0.6
-
cpe:2.3:a:apache:tomcat:5.0.7
-
cpe:2.3:a:apache:tomcat:5.0.8
-
cpe:2.3:a:apache:tomcat:5.0.9
-
cpe:2.3:a:apache:tomcat:5.5.0
-
cpe:2.3:a:apache:tomcat:5.5.1
-
cpe:2.3:a:apache:tomcat:5.5.10
-
cpe:2.3:a:apache:tomcat:5.5.11
-
cpe:2.3:a:apache:tomcat:5.5.12
-
cpe:2.3:a:apache:tomcat:5.5.13
-
cpe:2.3:a:apache:tomcat:5.5.14
-
cpe:2.3:a:apache:tomcat:5.5.15
-
cpe:2.3:a:apache:tomcat:5.5.2
-
cpe:2.3:a:apache:tomcat:5.5.3
-
cpe:2.3:a:apache:tomcat:5.5.4
-
cpe:2.3:a:apache:tomcat:5.5.5
-
cpe:2.3:a:apache:tomcat:5.5.6
-
cpe:2.3:a:apache:tomcat:5.5.7
-
cpe:2.3:a:apache:tomcat:5.5.8
-
cpe:2.3:a:apache:tomcat:5.5.9