Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/22122 | exploit vdb entry vendor advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html | mailing list exploit |
http://osvdb.org/32528 | vdb entry |
http://osvdb.org/32527 | vdb entry |
http://www.securityfocus.com/archive/1/459203/100/0/threaded | mailing list |
http://osvdb.org/32531 | vdb entry |
http://osvdb.org/32529 | vdb entry |
http://osvdb.org/32533 | vdb entry |
http://osvdb.org/32530 | vdb entry |
http://osvdb.org/32532 | vdb entry |
http://www.hackers.ir/advisories/festival.txt | exploit |