SQL injection vulnerability in the DT Register (com_dtregister) 2.2.3 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the eventId parameter in a pay_options action to index.php.
References
Configurations
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/47061 - | |
References | () http://secunia.com/advisories/31126 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/4023 - | |
References | () http://www.dthdevelopment.com/index.php?option=com_fireboard&Itemid=73&func=view&id=1883&catid=4 - | |
References | () http://www.securityfocus.com/bid/30256 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43851 - | |
References | () https://www.exploit-db.com/exploits/6086 - |
Information
Published : 2008-07-24 15:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3265
Mitre link : CVE-2008-3265
CVE.ORG link : CVE-2008-3265
JSON object : View
Products Affected
joomla
- com_dtregister
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')