source: http://www.securityfocus.com/bid/32599/info Jbook is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following example input is available: User:admin pass:' or '
Related ExploitsTrying to match CVEs (2): CVE-2008-6376, CVE-2008-6391
Trying to match OSVDBs (1): 52305
Other Possible E-DB Search Terms: Jbook
|2006-04-10||JBook 1.3 - 'index.php' Cross-Site Scripting||Psych0|
|2009-12-18||Joomla! Component com_jbook - Blind SQL Injection||FL0RiX|