Show plain JSON{"id": "CVE-2006-1049", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false}]}, "published": "2006-03-07T11:02:00.000", "references": [{"url": "http://secunia.com/advisories/19105", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.joomla.org/content/view/938/78/", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/23819", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/0818", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/19105", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.joomla.org/content/view/938/78/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/23819", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/0818", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-89"}]}], "descriptions": [{"lang": "en", "value": "Multiple SQL injection vulnerabilities in the Admin functionality in Joomla! 1.0.7 and earlier allow remote authenticated administrators to execute arbitrary SQL commands via unknown attack vectors."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "688421F4-D71B-4ABD-8508-B2AD0B66990F", "versionEndIncluding": "1.0.7"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC268591-FDFD-42A2-887F-4F1639CAB73C"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E8E5942-AB17-45E8-B3D3-4DDD1DFA48D8"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89946AA1-0694-44A5-962E-ED36B4BFCE9C"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6024ABB5-0CB7-4874-8758-CC6FBF3073D7"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A41E39D9-ADD7-41A1-9E38-BD418B59E5E2"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05C21464-3FD4-4528-A512-7C0DE70E331C"}, {"criteria": "cpe:2.3:a:joomla:joomla:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "663EE640-2BE7-42FC-B848-7379C6DADA60"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}