Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.
References
Configurations
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html - Exploit | |
References | () http://osvdb.org/32527 - | |
References | () http://osvdb.org/32528 - | |
References | () http://osvdb.org/32529 - | |
References | () http://osvdb.org/32530 - | |
References | () http://osvdb.org/32531 - | |
References | () http://osvdb.org/32532 - | |
References | () http://osvdb.org/32533 - | |
References | () http://www.hackers.ir/advisories/festival.txt - Exploit | |
References | () http://www.securityfocus.com/archive/1/459203/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/22122 - Exploit, Vendor Advisory |
Information
Published : 2007-01-19 23:28
Updated : 2024-11-21 00:25
NVD link : CVE-2007-0373
Mitre link : CVE-2007-0373
CVE.ORG link : CVE-2007-0373
JSON object : View
Products Affected
joomla
- joomla
CWE