{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T13:27:04.389","vulnerabilities":[{"cve":{"id":"CVE-2006-0913","sourceIdentifier":"cve@mitre.org","published":"2006-02-28T11:02:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in whineatnews.pl in Bugzilla 2.17 through 2.18.4 and 2.20 allows remote authenticated users with administrative privileges to execute arbitrary SQL commands via the whinedays parameter, as accessible from editparams.cgi."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:P","baseScore":5.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*","matchCriteriaId":"BBCDA64F-C49A-4F5B-B285-4079D8E3A499"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*","matchCriteriaId":"85ED3457-CC21-4DB3-931F-677F723E1B2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*","matchCriteriaId":"6C8711D3-55CF-4131-BBAC-6BE07068219F"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*","matchCriteriaId":"DF54FFA5-5177-46E6-9AFA-BA3345C16E8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*","matchCriteriaId":"69D7EA7C-B401-4F5A-AC08-2199DD117403"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*","matchCriteriaId":"DC2DDC7C-CD2B-4597-A5E0-266A884958FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*","matchCriteriaId":"3635C0E9-2E43-4BAE-8267-2BB2F68B03BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*","matchCriteriaId":"4869A709-AF79-49BD-A7D2-D48A8D79A085"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*","matchCriteriaId":"EAC72143-27C3-498F-AFAB-98AE043C0545"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*","matchCriteriaId":"BE5E8E72-D493-460D-B5A0-F90C291398A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*","matchCriteriaId":"04885D31-09F3-455F-A1A9-815E182ABCF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*","matchCriteriaId":"F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*","matchCriteriaId":"92BCD546-2A50-4F43-935C-B68459EE894E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*","matchCriteriaId":"725BD7BE-1769-4032-ADA8-9ED15528C770"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*","matchCriteriaId":"239D70F4-7D86-4A57-ACEF-440F68994FB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*","matchCriteriaId":"ABEE2C94-DA69-4A78-A15F-538383A7460E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*","matchCriteriaId":"4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*","matchCriteriaId":"A749C7AB-6F60-469C-BD95-759205DDA345"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*","matchCriteriaId":"B45F6C27-D89A-42A0-A304-5B0C57D2A9F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*","matchCriteriaId":"196B7CD8-D721-4CFB-B126-78758128E900"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*","matchCriteriaId":"2053CFB4-602E-4141-BB3D-A440E2A31D85"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*","matchCriteriaId":"31ACBA13-AC13-4469-862F-B3DD2327B6FC"}]}]}],"references":[{"url":"http://secunia.com/advisories/18979","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.osvdb.org/23378","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/425584/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/16738","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2006/0692","source":"cve@mitre.org"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=312498","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24819","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/18979","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.osvdb.org/23378","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/425584/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/16738","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2006/0692","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=312498","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24819","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}