{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T06:33:26.197","vulnerabilities":[{"cve":{"id":"CVE-2004-0707","sourceIdentifier":"cve@mitre.org","published":"2004-07-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in editusers.cgi in Bugzilla 2.16.x before 2.16.6, and 2.18 before 2.18rc1, allows remote attackers with privileges to grant membership to any group to execute arbitrary SQL."},{"lang":"es","value":"Vulnerabilidad de inyección de SQL en editusers.cgi en Bugzilla 2.16.x anteriores a 2.16.6, y 2.18 anterioresa a 2.18rc1, permite a atacantes remotos con privilegios otorgar privilegio de pertenencia a cualquier grupo para ejecutar SQL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*","matchCriteriaId":"8112FF13-B4CE-4DC7-85B1-C69D975F162B"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*","matchCriteriaId":"86F5A3CA-E4A6-4E51-AC83-0C8F3E5E2C4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*","matchCriteriaId":"F6E5E379-D475-42F3-B0DC-3D04C1D25566"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*","matchCriteriaId":"893741D3-062B-45F9-B5A3-1B81058E7FD7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*","matchCriteriaId":"E8D53B5F-6AEE-4192-B838-E1DA92C59285"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*","matchCriteriaId":"1883A98C-E595-4F3C-87BF-A63393F9F561"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*","matchCriteriaId":"DD49E53A-5676-4FAC-A8A2-30FAC04C33D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*","matchCriteriaId":"1084AF8E-5269-4EFF-BBD2-C5A77945FCF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*","matchCriteriaId":"D9A4B035-B73E-48E9-BBB9-83219F5D2A95"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*","matchCriteriaId":"9452C271-2812-4775-8396-394C642EACFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*","matchCriteriaId":"2D351AF2-C0AB-4BB3-8692-677A3025A615"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*","matchCriteriaId":"F16D338E-C5BC-46E1-95DD-D9B0E25EE56E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*","matchCriteriaId":"19F19219-3AFD-4D8E-B02B-BFCBD1BC7C36"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*","matchCriteriaId":"B900D9A7-913A-4176-90CF-C7C3B09A4261"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*","matchCriteriaId":"B692910E-633D-4A88-B245-56A2B58DD4CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*","matchCriteriaId":"F86EE5DB-442B-4C78-8152-AF1048C6A974"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*","matchCriteriaId":"19B82A1A-56EB-41D5-8619-2A717E3A6ECF"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*","matchCriteriaId":"9B2FC5C7-B218-4B87-9805-F90AC0E7A281"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*","matchCriteriaId":"BBCDA64F-C49A-4F5B-B285-4079D8E3A499"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*","matchCriteriaId":"85ED3457-CC21-4DB3-931F-677F723E1B2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*","matchCriteriaId":"6C8711D3-55CF-4131-BBAC-6BE07068219F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*","matchCriteriaId":"DF54FFA5-5177-46E6-9AFA-BA3345C16E8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*","matchCriteriaId":"69D7EA7C-B401-4F5A-AC08-2199DD117403"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*","matchCriteriaId":"DC2DDC7C-CD2B-4597-A5E0-266A884958FC"}]}]}],"references":[{"url":"http://bugzilla.mozilla.org/show_bug.cgi?id=244272","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=108965446813639&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/10698","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/16668","source":"cve@mitre.org"},{"url":"http://bugzilla.mozilla.org/show_bug.cgi?id=244272","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=108965446813639&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/10698","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/16668","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}