CVE-2006-0913
Published Feb 28, 2006
Last updated 6 years ago
Overview
- Description
- SQL injection vulnerability in whineatnews.pl in Bugzilla 2.17 through 2.18.4 and 2.20 allows remote authenticated users with administrative privileges to execute arbitrary SQL commands via the whinedays parameter, as accessible from editparams.cgi.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC" } ], "operator": "OR" } ] } ]