SQL injection vulnerability in the Address visualization with Google Maps (st_address_map) extension before 0.3.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
Link | Resource |
---|---|
http://typo3.org/extensions/repository/view/st_address_map | Vendor Advisory |
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/69564 | |
http://typo3.org/extensions/repository/view/st_address_map | Vendor Advisory |
http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/69564 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://typo3.org/extensions/repository/view/st_address_map - Vendor Advisory | |
References | () http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/69564 - |
Information
Published : 2014-09-11 14:16
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6239
Mitre link : CVE-2014-6239
CVE.ORG link : CVE-2014-6239
JSON object : View
Products Affected
address_visualization_with_google_maps_project
- address_visualization_with_google_maps
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')