Show plain JSON{"id": "CVE-2006-7034", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2007-02-23T03:28:00.000", "references": [{"url": "http://securityreason.com/securityalert/2285", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/435166/30/4680/threaded", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26720", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/2285", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/435166/30/4680/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26720", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in directory.php in Super Link Exchange Script 1.0 might allow remote attackers to execute arbitrary SQL queries via the cat parameter."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en directory.php en Super Link Exchange Script 1.0 podr\u00eda permitir a atacantes remotos ejecutar consultas SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro cat."}], "lastModified": "2024-11-21T00:24:13.820", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "786BB737-EA99-4EC6-B742-0C35BF2453F9"}, {"criteria": "cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}, {"criteria": "cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F6E90A8-BF8E-46AD-A0E6-4266EE0AE70C"}, {"criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79"}, {"criteria": "cpe:2.3:o:ibm:os2:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD5511BD-2A41-4FF6-BD3F-9448F3F8AC90"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"}, {"criteria": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}, {"criteria": "cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "377F7D0C-6B44-4B90-BF90-DAF959880C6D"}, {"criteria": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "82F7322B-8022-4D0B-ADB3-D0F5B6F20309"}, {"criteria": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D3B703C-79B2-4FA2-9E12-713AB977A880"}, {"criteria": "cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AA733AD2-D948-46A0-A063-D29081A56F1F"}, {"criteria": "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "799DA395-C7F8-477C-8BC7-5B4B88FB7503"}, {"criteria": "cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E53CDA8E-50A8-4509-B070-CCA5604FFB21"}, {"criteria": "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "580B0C9B-DD85-40FA-9D37-BAC0C96D57FC"}, {"criteria": "cpe:2.3:o:santa_cruz_operation:sco_unix:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ECCBDA43-9C75-4B36-8C90-EF26B8CD777D"}, {"criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9"}, {"criteria": "cpe:2.3:o:windriver:bsdos:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "60ACA374-1434-4C02-8327-17BC9C000B65"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:super_link_exchange_script:super_link_exchange_script:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72865C64-C70A-4CBC-83B7-629DE0DD3532"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}