CVE-2006-0914
Published Feb 28, 2006
Last updated 6 years ago
Overview
- Description
- Bugzilla 2.16.10, 2.17 through 2.18.4, and 2.20 does not properly handle certain characters in the mostfreqthreshold parameter in duplicates.cgi, which allows remote attackers to trigger a SQL error.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28C34288-A326-4B71-99B0-DA9FFD28160F" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B2FC5C7-B218-4B87-9805-F90AC0E7A281" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1" }, { "criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900" } ], "operator": "OR" } ] } ]