{ "schema_version": "1.4.0", "id": "GHSA-79r3-cpc5-fc6p", "modified": "2022-05-01T17:43:44Z", "published": "2022-05-01T17:43:44Z", "aliases": [ "CVE-2007-0373" ], "details": "Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0373" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html" }, { "type": "WEB", "url": "http://osvdb.org/32527" }, { "type": "WEB", "url": "http://osvdb.org/32528" }, { "type": "WEB", "url": "http://osvdb.org/32529" }, { "type": "WEB", "url": "http://osvdb.org/32530" }, { "type": "WEB", "url": "http://osvdb.org/32531" }, { "type": "WEB", "url": "http://osvdb.org/32532" }, { "type": "WEB", "url": "http://osvdb.org/32533" }, { "type": "WEB", "url": "http://www.hackers.ir/advisories/festival.txt" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/459203/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/22122" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-01-19T23:28:00Z" } }