Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.16:*:*:*:*:*:*:*", "matchCriteriaId": "A30F5C69-448C-4A63-A4B7-81C6841C10EC", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.17:*:*:*:*:*:*:*", "matchCriteriaId": "A98A5367-50C9-4A8B-960A-28F436BEABAD", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.18:*:*:*:*:*:*:*", "matchCriteriaId": "6FAD3061-01D5-41CD-B679-86F87C742961", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.19:*:*:*:*:*:*:*", "matchCriteriaId": "32B8434F-7960-4F39-9F87-550AD21F8EFC", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.20:*:*:*:*:*:*:*", "matchCriteriaId": "B0863184-6BBB-4C14-A669-964785565923", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.21:*:*:*:*:*:*:*", "matchCriteriaId": "7E045B79-1625-474C-8D68-0A9448EDBB80", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.22:*:*:*:*:*:*:*", "matchCriteriaId": "81181C64-4DF1-4229-9A76-D5CDACA260CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.23:*:*:*:*:*:*:*", "matchCriteriaId": "5C8D4F44-AEE0-4378-BC6E-111D15C3417F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.24:*:*:*:*:*:*:*", "matchCriteriaId": "AF067E3D-0082-48A0-9898-656E2D11CB06", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.25:*:*:*:*:*:*:*", "matchCriteriaId": "B658A8E2-EA46-4A08-936F-EE169F2E34B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.26:*:*:*:*:*:*:*", "matchCriteriaId": "BE93BFBF-EFFC-4E74-BD54-C597A82C222C", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.27:*:*:*:*:*:*:*", "matchCriteriaId": "38521F36-D3A6-4EEF-9F6E-7F28D4BDDF5B", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.28:*:*:*:*:*:*:*", "matchCriteriaId": "93E71247-4DDA-4ADB-B3E1-44C0623A9444", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.29:*:*:*:*:*:*:*", "matchCriteriaId": "43416CEC-E835-4822-90B8-B86012B6AB6D", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.30:*:*:*:*:*:*:*", "matchCriteriaId": "BA1B579C-8725-41A7-8898-0610DF06BF90", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.31:*:*:*:*:*:*:*", "matchCriteriaId": "3A573E50-BB2A-4725-AB9B-B7767D885AE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.32:*:*:*:*:*:*:*", "matchCriteriaId": "E8BA039F-F719-4782-ADA7-8401F83A371C", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.33:*:*:*:*:*:*:*", "matchCriteriaId": "DE8841C8-9731-4C48-AF06-0A037CBF826A", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.34:*:*:*:*:*:*:*", "matchCriteriaId": "70498162-CC10-4A21-B33E-392872149914", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.35:*:*:*:*:*:*:*", "matchCriteriaId": "A0391691-FA02-44EB-BC46-E457FE63B405", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.36:*:*:*:*:*:*:*", "matchCriteriaId": "9A0B7558-E96F-4EE4-BD65-78A4149FB588", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.37:*:*:*:*:*:*:*", "matchCriteriaId": "30E805AA-212A-464C-B7AA-FCB8B62042D4", "vulnerable": true}, {"criteria": "cpe:2.3:a:dataparksearch:dataparksearch:4.42:*:*:*:*:*:*:*", "matchCriteriaId": "34BD3CCF-0C01-426D-8E9A-834543DF1D36", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in DataparkSearch Engine 4.42 and earlier allows remote attackers to execute arbitrary SQL commands via a malformed hostname in a URL."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en DataparkSearch Engine 4.42 y anteriores permite a un atacante remoto ejecutar comandos SQL a trav\u00e9s de un nombre de host mal formado en una URL."}], "id": "CVE-2006-5723", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2006-11-04T01:07:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.dataparksearch.org/ChangeLog"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/20872"}, {"source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4311"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29979"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.dataparksearch.org/ChangeLog"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.securityfocus.com/bid/20872"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4311"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29979"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}