{ "schema_version": "1.4.0", "id": "GHSA-rf89-grg4-3xhh", "modified": "2025-04-03T04:41:15Z", "published": "2022-05-01T07:23:52Z", "aliases": [ "CVE-2006-4992" ], "details": "Multiple PHP remote file inclusion vulnerabilities in JD-WordPress for Joomla! (com_jd-wp) 2.0-1.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) wp-comments-post.php, (2) wp-feed.php, or (3) wp-trackback.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4992" }, { "type": "WEB", "url": "http://forum.joomla.org/index.php/topic%2C79477.0.html" }, { "type": "WEB", "url": "http://forum.joomla.org/index.php/topic%2C81064.0.html" }, { "type": "WEB", "url": "http://forum.joomla.org/index.php/topic,79477.0.html" }, { "type": "WEB", "url": "http://forum.joomla.org/index.php/topic,81064.0.html" }, { "type": "WEB", "url": "http://www.babilonics.com/?q=node/1802" }, { "type": "WEB", "url": "http://www.osvdb.org/28997" }, { "type": "WEB", "url": "http://www.osvdb.org/28998" }, { "type": "WEB", "url": "http://www.osvdb.org/28999" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19209" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-09-26T02:07:00Z" } }