{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T14:34:32.333","vulnerabilities":[{"cve":{"id":"CVE-2013-5697","sourceIdentifier":"cve@mitre.org","published":"2013-09-30T21:55:09.707","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in mod_accounting.c in the mod_accounting module 0.5 and earlier for Apache allows remote attackers to execute arbitrary SQL commands via a Host header."},{"lang":"es","value":"Vulnerabilidad de inyección SQL en mod_accounting.c del módulo mod_accounting para Apache en la versión 0.5 y anteriores permite a atacantes remotos ejecutar comandos SQL arbitrarios a través de la cabecera Host."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:simone_tellini:mod_accounting:*:*:*:*:*:*:*:*","versionEndIncluding":"0.5","matchCriteriaId":"19D9812D-C93A-4765-AED4-A4F876A3431D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*","matchCriteriaId":"28EC1F94-04F3-490A-8324-1EB60EEBAD4B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D9B12229-3F9E-469C-8AD6-7E43FA45B876"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"30D94958-0D13-4076-B6F0-61D505136789"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"30E78DB9-B440-42A0-9F7E-40ECAB62CC62"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"691D7D29-420E-4ABC-844F-D5DD401598F1"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"B22DA22E-54DA-46CF-B3AE-4B0900D8086A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*","matchCriteriaId":"F90F496A-5D57-448F-A46F-E15F06CBFD01"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*","matchCriteriaId":"1EC3D727-F7C1-4CA1-BBF4-9A38BD3B052F"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*","matchCriteriaId":"89B58983-633F-4D20-80AE-8E7EB865CF83"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*","matchCriteriaId":"EB2EC909-197D-4509-9D89-374D89BBBA26"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*","matchCriteriaId":"96E2083D-E7EC-49D1-A870-7F0B0AF0F614"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*","matchCriteriaId":"19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"F715F8CB-A473-4374-8CF1-E9D74EBA5E8F"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*","matchCriteriaId":"7B6EE0E2-D608-4E72-A0E5-F407511405C2"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*","matchCriteriaId":"33FD6791-3B84-40CA-BCF4-B5637B172F2A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*","matchCriteriaId":"06F447C8-15FE-44DE-86AD-5E2D496AB2A6"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*","matchCriteriaId":"6DDD2F69-CFD4-4DEA-B43A-1337EEFA95A3"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*","matchCriteriaId":"A4955E57-9C5D-40C2-BD5F-A383FF3C33FB"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*","matchCriteriaId":"6A7607F8-6C2A-4976-A861-3BEE1F45002B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*","matchCriteriaId":"0A80B17D-FD66-40BD-9ADC-FE7A3944A696"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*","matchCriteriaId":"713ADED4-CBE5-40C3-A128-99CFABF24560"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*","matchCriteriaId":"70FA0B8E-1A90-4939-871A-38B9E93BCCC1"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*","matchCriteriaId":"83BDEAE5-29B9-48E3-93FA-F30832044C9A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*","matchCriteriaId":"A2720E06-1B0E-4BFE-8C85-A17E597BB151"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*","matchCriteriaId":"3EE1DECF-36C7-4968-8B7A-7A2034C2A957"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*","matchCriteriaId":"B67BD173-8517-4E97-BC65-D9657C63601A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*","matchCriteriaId":"B392A96F-FD2F-4073-8EED-EB31E1F20FE4"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*","matchCriteriaId":"E130104B-86F5-411E-8AC0-9B4B780BCA00"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*","matchCriteriaId":"0E62E621-74DA-4D99-A79C-AD2B85896A2B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*","matchCriteriaId":"2C577188-BD56-4571-A61A-1684DC9E9DD9"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*","matchCriteriaId":"5B3A4CD9-1E96-4D3B-938D-F2D15855B0DD"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*","matchCriteriaId":"65AD2A8B-2BCA-4CE5-A03C-BFC07DF52EDC"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*","matchCriteriaId":"4058CE14-1CC8-42FD-A6BD-6869C1610E57"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*","matchCriteriaId":"0716E399-A5FE-4C49-BC48-CD97C03997A7"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*","matchCriteriaId":"EE672251-C99E-49B7-9526-E535E3EE313A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*","matchCriteriaId":"CD08A86E-B2B6-4BE3-8514-E1940340C60A"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*","matchCriteriaId":"814644C7-EECB-4006-BBDC-9AF0AF56098B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*","matchCriteriaId":"42941901-B01D-4F12-AB7F-48A7F9BB4800"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*","matchCriteriaId":"0028C6B6-B65C-4878-BA7E-E1ABCED5202C"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*","matchCriteriaId":"52820C56-B1AA-4D07-BC92-648EC4813D5B"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*","matchCriteriaId":"31D3FBB6-3CFE-4B34-8516-AC18FA9E6B72"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*","matchCriteriaId":"38F49D13-FA48-4F93-89C7-EEB704F06845"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*","matchCriteriaId":"E6B5EBC8-C655-463C-9D5C-0BDE9C4DC956"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*","matchCriteriaId":"F65C3B1C-4CB4-4D0C-8E03-3E9BB1A52A12"},{"vulnerable":false,"criteria":"cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*","matchCriteriaId":"3BF9A2A4-4C87-4919-B330-813683C3CC0D"}]}]}],"references":[{"url":"http://osvdb.org/97588","source":"cve@mitre.org"},{"url":"http://www.baesystemsdetica.com.au/Research/Advisories/mod_accounting-Blind-SQL-Injection-%28DS-2013-006%29","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://osvdb.org/97588","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.baesystemsdetica.com.au/Research/Advisories/mod_accounting-Blind-SQL-Injection-%28DS-2013-006%29","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}