Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:*:*:*:*:*:typo3:*:*", "matchCriteriaId": "B3D5E44F-1136-46C0-9EE6-11875883F485", "versionEndIncluding": "0.3.5", "vulnerable": true}, {"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:0.3.0:*:*:*:*:typo3:*:*", "matchCriteriaId": "019358B9-1F83-4356-B3EC-E8F100883B96", "vulnerable": true}, {"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:0.3.1:*:*:*:*:typo3:*:*", "matchCriteriaId": "4E663953-E178-4FF4-A766-4D4D31D45B64", "vulnerable": true}, {"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:0.3.2:*:*:*:*:typo3:*:*", "matchCriteriaId": "62B63450-82F2-4A9D-8CFF-806404F95DE4", "vulnerable": true}, {"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:0.3.3:*:*:*:*:typo3:*:*", "matchCriteriaId": "5D0AC1EF-3190-4D9B-8261-206F685F5198", "vulnerable": true}, {"criteria": "cpe:2.3:a:address_visualization_with_google_maps_project:address_visualization_with_google_maps:0.3.4:*:*:*:*:typo3:*:*", "matchCriteriaId": "FC2A2EC3-C430-4E86-AF50-3DD764459EE9", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "SQL injection vulnerability in the Address visualization with Google Maps (st_address_map) extension before 0.3.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors."}, {"lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en la extensi\u00f3n Address visualization with Google Maps (st_address_map) anterior a 0.3.6 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de vectores no especificados."}], "id": "CVE-2014-6239", "lastModified": "2024-11-21T02:14:00.753", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2014-09-11T14:16:05.163", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://typo3.org/extensions/repository/view/st_address_map"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/69564"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://typo3.org/extensions/repository/view/st_address_map"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://typo3.org/teams/security/security-bulletins/typo3-extensions/typo3-ext-sa-2014-010"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69564"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-89"}], "source": "nvd@nist.gov", "type": "Primary"}]}