Multiple SQL injection vulnerabilities in PHP-Fusion before 6.00.110 allow remote attackers to execute arbitrary SQL commands via (1) the activate parameter in register.php and (2) the cat_id parameter in faq.php.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Php_fusion | Php_fusion | 6.00.100 (including) | 6.00.100 (including) |
Php_fusion | Php_fusion | 6.00.101 (including) | 6.00.101 (including) |
Php_fusion | Php_fusion | 6.00.102 (including) | 6.00.102 (including) |
Php_fusion | Php_fusion | 6.00.103 (including) | 6.00.103 (including) |
Php_fusion | Php_fusion | 6.00.104 (including) | 6.00.104 (including) |
Php_fusion | Php_fusion | 6.00.105 (including) | 6.00.105 (including) |
Php_fusion | Php_fusion | 6.00.106 (including) | 6.00.106 (including) |
Php_fusion | Php_fusion | 6.00.107 (including) | 6.00.107 (including) |
Php_fusion | Php_fusion | 6.00.108 (including) | 6.00.108 (including) |
Php_fusion | Php_fusion | 6.00.109 (including) | 6.00.109 (including) |