SQL injection vulnerability in the JV Comment (com_jvcomment) component before 3.0.3 for Joomla! allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a comment.like action to index.php.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://extensions.joomla.org/extensions/contacts-and-feedback/articles-comments/23394 - Vendor Advisory | |
References | () http://www.exploit-db.com/exploits/31175 - | |
References | () http://www.osvdb.org/101960 - | |
References | () http://www.securityfocus.com/archive/1/530872/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/64661 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90532 - | |
References | () https://www.htbridge.com/advisory/HTB23195 - |
Information
Published : 2014-01-26 20:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0794
Mitre link : CVE-2014-0794
CVE.ORG link : CVE-2014-0794
JSON object : View
Products Affected
joomla
- com_jvcomment
- joomla\!
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')