U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2006-2016

Change History

Modified Analysis by NIST 11/16/2020 2:32:00 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.3:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.4:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.4a:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.4b:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.5:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.6:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.6c:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.7:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:phpldapadmin:phpldapadmin:0.9.8:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:phpldapadmin_project:phpldapadmin:*:*:*:*:*:*:*:* versions up to (including) 0.9.8
Added CWE

								
							
							
						
NIST CWE-79
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://pridels0.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html No Types Assigned
http://pridels0.blogspot.com/2006/04/phpldapadmin-multiple-vuln.html Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/19747 Exploit, Vendor Advisory
http://secunia.com/advisories/19747 Exploit, Third Party Advisory
Changed Reference Type
http://secunia.com/advisories/20124 No Types Assigned
http://secunia.com/advisories/20124 Third Party Advisory
Changed Reference Type
http://www.debian.org/security/2006/dsa-1057 No Types Assigned
http://www.debian.org/security/2006/dsa-1057 Third Party Advisory
Changed Reference Type
http://www.osvdb.org/24788 Exploit
http://www.osvdb.org/24788 Broken Link, Exploit
Changed Reference Type
http://www.osvdb.org/24789 Exploit
http://www.osvdb.org/24789 Broken Link, Exploit
Changed Reference Type
http://www.osvdb.org/24790 Exploit
http://www.osvdb.org/24790 Broken Link, Exploit
Changed Reference Type
http://www.osvdb.org/24792 Exploit
http://www.osvdb.org/24792 Broken Link, Exploit
Changed Reference Type
http://www.osvdb.org/24793 Exploit
http://www.osvdb.org/24793 Broken Link, Exploit
Changed Reference Type
http://www.osvdb.org/24794 Exploit
http://www.osvdb.org/24794 Broken Link, Exploit
Changed Reference Type
http://www.securityfocus.com/bid/17643 Exploit
http://www.securityfocus.com/bid/17643 Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.vupen.com/english/advisories/2006/1450 No Types Assigned
http://www.vupen.com/english/advisories/2006/1450 Permissions Required
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/25958 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/25958 Third Party Advisory, VDB Entry
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/25959 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/25959 Third Party Advisory, VDB Entry