This script is Copyright (C) 2007-2012 Tenable Network Security, Inc.
The remote web server contains a JSP application that is affected by a
cross-site scripting vulnerability.
The remote web server includes an example JSP application, 'cal2.jsp',
that fails to sanitize user-supplied input before using it to generate
dynamic content. An unauthenticated, remote attacker may be able to
leverage this issue to inject arbitrary HTML or script code into a
user's browser to be executed within the security context of the
See also :
Either undeploy the Tomcat examples web application or upgrade to
Tomcat 4.1.32 / 5.5.16 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 26070 ()
Bugtraq ID: 25531
CVE ID: CVE-2006-7196
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.