Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote malicious users to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
joomla joomla 1.5.0_beta |