Show plain JSON{"id": "CVE-2006-6161", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2006-11-28T23:28:00.000", "references": [{"url": "http://www.securityfocus.com/bid/32884", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/4704", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47420", "source": "cve@mitre.org"}, {"url": "https://www.exploit-db.com/exploits/7493", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/32884", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/4704", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47420", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/7493", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in Doug Luxem Liberum Help Desk 0.97.3 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id and (2) uid parameter to (a) inout/status.asp, (b) inout/update.asp, and (c) forgotpass.asp. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Doug Luxem Liberum Help Desk 0.97.3 y anteriores permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante los par\u00e1metros (1) id y (2) uid a (a) inout/status.asp, (b) inout/update.asp, y (c) forgotpass.asp. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles se han obtenido solamente de informaci\u00f3n de terceros."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:doug_luxem:liberum_help_desk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BB2C539-4C0F-478B-A298-D3FCB5CAB95F", "versionEndIncluding": "0.97.3"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}