CVE-2006-7010
 
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks.
La implementación de mosgetparam en Joomla! anterior a 1.0.10, no establece el tipo de dato de una variable a entero cuando el valor por defecto de la variable es numérico, lo cual tiene impacto y vectores de ataque no especificados, que pueden permitir ataques de inyección SQL.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-02-12 CVE Reserved
- 2007-02-12 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.osvdb.org/26916 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/20874 | 2008-09-05 | |
http://www.joomla.org/content/view/1510/74 | 2008-09-05 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.0 Search vendor "Joomla" for product "Joomla" and version "1.0.0" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.1 Search vendor "Joomla" for product "Joomla" and version "1.0.1" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.2 Search vendor "Joomla" for product "Joomla" and version "1.0.2" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.3 Search vendor "Joomla" for product "Joomla" and version "1.0.3" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.4 Search vendor "Joomla" for product "Joomla" and version "1.0.4" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.5 Search vendor "Joomla" for product "Joomla" and version "1.0.5" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.6 Search vendor "Joomla" for product "Joomla" and version "1.0.6" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.7 Search vendor "Joomla" for product "Joomla" and version "1.0.7" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.8 Search vendor "Joomla" for product "Joomla" and version "1.0.8" | - |
Affected
| ||||||
Joomla Search vendor "Joomla" | Joomla Search vendor "Joomla" for product "Joomla" | 1.0.9 Search vendor "Joomla" for product "Joomla" and version "1.0.9" | - |
Affected
|