Логотип exploitDog
bind:CVE-2006-1794
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-1794

Количество 3

Количество 3

nvd логотип

CVE-2006-1794

больше 19 лет назад

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).

CVSS2: 7.6
EPSS: Низкий
debian логотип

CVE-2006-1794

больше 19 лет назад

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earli ...

CVSS2: 7.6
EPSS: Низкий
github логотип

GHSA-v96v-x3w6-88vq

больше 3 лет назад

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-1794

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).

CVSS2: 7.6
1%
Низкий
больше 19 лет назад
debian логотип
CVE-2006-1794

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earli ...

CVSS2: 7.6
1%
Низкий
больше 19 лет назад
github логотип
GHSA-v96v-x3w6-88vq

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php).

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу