{ "schema_version": "1.4.0", "id": "GHSA-vp6f-h8p3-g9hj", "modified": "2022-05-01T02:16:45Z", "published": "2022-05-01T02:16:45Z", "aliases": [ "CVE-2005-3324" ], "details": "SQL injection vulnerability in chat.php in MWChat 6.8 allows remote attackers to execute arbitrary SQL commands via the username parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3324" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22845" }, { "type": "WEB", "url": "http://appindex.net/products/changelog/?product=mwchat&version=6.9" }, { "type": "WEB", "url": "http://rgod.altervista.org/mwchat.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17303" }, { "type": "WEB", "url": "http://securitytracker.com/id?1015094" }, { "type": "WEB", "url": "http://www.hackerscenter.com/Archive/view.asp?id=19537" }, { "type": "WEB", "url": "http://www.osvdb.org/20266" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15198" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2005/2180" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-27T10:02:00Z" } }