{ "schema_version": "1.4.0", "id": "GHSA-v96v-x3w6-88vq", "modified": "2025-04-03T04:30:22Z", "published": "2022-05-01T06:52:48Z", "aliases": [ "CVE-2006-1794" ], "details": "SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-1794" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24951" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2006-02/0463.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/18935" }, { "type": "WEB", "url": "http://source.mambo-foundation.org/view/news/Announcements/Security_Patch_Released" }, { "type": "WEB", "url": "http://www.gulftech.org/?node=research&article_id=00104-02242006" }, { "type": "WEB", "url": "http://www.osvdb.org/23402" }, { "type": "WEB", "url": "http://www.osvdb.org/23503" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/16775" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/0719" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-04-17T10:02:00Z" } }