1 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in the Pulse Infotech Sponsor Wall (com_sponsorwall) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php. Vulnerabilidad de inyección SQL en el componente Pulse Infotech Sponsor Wall (com_sponsorwall) v1.1 para Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro catid en index.php • https://www.exploit-db.com/exploits/15367 http://packetstormsecurity.org/1011-exploits/joomlasponsorwall-sql.txt http://secunia.com/advisories/42072 http://www.exploit-db.com/exploits/15367 http://www.osvdb.org/68956 http://www.securityfocus.com/bid/44571 https://exchange.xforce.ibmcloud.com/vulnerabilities/62915 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •