{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T09:51:23.889","vulnerabilities":[{"cve":{"id":"CVE-2006-6706","sourceIdentifier":"cve@mitre.org","published":"2006-12-23T01:28:00.000","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in Soumu Workflow for Groupmax 01-00 through 01-01, Soumu Workflow 02-00 through 03-03, and Koukyoumuke Soumu Workflow 01-00 through 01-01 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors in certain web pages."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en Soumu Workflow para Groupmax 01-00 hasta la 01-01, Soumu Workflow 02-00 hasta la 03-03, y Koukyoumuke Soumu Workflow 01-00 hasta la 01-01 permite a un usuarios remotos validados ejecutar comandos SQL de su elección a través de vectores no especificados en ciertas páginas web."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:koukyoumuke_soumu_workflow:01-00:*:*:*:*:*:*:*","matchCriteriaId":"D7237C84-D299-46C2-94AA-AC6C3AADB1AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:koukyoumuke_soumu_workflow:01-01:*:*:*:*:*:*:*","matchCriteriaId":"AAB3C969-9EBB-474A-B1DB-9BBC1C6C2E46"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:soumo_workflow:01_00:*:*:*:*:*:*:*","matchCriteriaId":"4B28264C-01AA-4EA3-9D31-2A40DB4B0342"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:soumo_workflow:01_01:*:*:*:*:*:*:*","matchCriteriaId":"8B2AC218-56E1-4114-9D54-39CB094A207D"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:soumu_workflow:02-00:*:*:*:*:*:*:*","matchCriteriaId":"026F1097-2F73-4158-8AE7-EFBF69068B7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:soumu_workflow:02-01:*:*:*:*:*:*:*","matchCriteriaId":"A2915D11-3937-47D2-93F4-0F92F75D7AE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:soumu:soumu_workflow:03-03:*:*:*:*:*:*:*","matchCriteriaId":"FE8E8D7A-65C5-4245-9BBD-BEB8C8F1B36D"}]}]}],"references":[{"url":"http://secunia.com/advisories/23399","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html","source":"cve@mitre.org"},{"url":"http://www.vupen.com/english/advisories/2006/5114","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/23399","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.hitachi-support.com/security_e/vuls_e/HS06-016_e/01-e.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/5114","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}