CVE-2007-0373

Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joomla:joomla:1.5.0_beta:*:*:*:*:*:*:*

History

21 Nov 2024, 00:25

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html - Exploit
References () http://osvdb.org/32527 - () http://osvdb.org/32527 -
References () http://osvdb.org/32528 - () http://osvdb.org/32528 -
References () http://osvdb.org/32529 - () http://osvdb.org/32529 -
References () http://osvdb.org/32530 - () http://osvdb.org/32530 -
References () http://osvdb.org/32531 - () http://osvdb.org/32531 -
References () http://osvdb.org/32532 - () http://osvdb.org/32532 -
References () http://osvdb.org/32533 - () http://osvdb.org/32533 -
References () http://www.hackers.ir/advisories/festival.txt - Exploit () http://www.hackers.ir/advisories/festival.txt - Exploit
References () http://www.securityfocus.com/archive/1/459203/100/0/threaded - () http://www.securityfocus.com/archive/1/459203/100/0/threaded -
References () http://www.securityfocus.com/bid/22122 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/22122 - Exploit, Vendor Advisory

Information

Published : 2007-01-19 23:28

Updated : 2024-11-21 00:25


NVD link : CVE-2007-0373

Mitre link : CVE-2007-0373

CVE.ORG link : CVE-2007-0373


JSON object : View

Products Affected

joomla

  • joomla