1 results (0.008 seconds)

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 4

SQL injection vulnerability in models/log.php in the Search Log (com_searchlog) component 3.1.0 for Joomla! allows remote authenticated users, with Public Back-end privileges, to execute arbitrary SQL commands via the search parameter in a log action to administrator/index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección SQL en los models/log.php en el componente Search Log (com_searchlog) v3.1.0 para Joomla! permite a usuarios autenticados remotamente, con privilegios Public Back-end, ejecutar comandos SQL a través del parámetro search en una acción de registro en administrator/index.php. • https://www.exploit-db.com/exploits/13746 https://www.exploit-db.com/exploits/13745 http://osvdb.org/65185 http://secunia.com/advisories/40055 http://www.exploit-db.com/exploits/13746 http://www.securityfocus.com/bid/40588 http://www.vupen.com/english/advisories/2010/1363 https://exchange.xforce.ibmcloud.com/vulnerabilities/59152 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •