Description
SQL injection vulnerability in the JoltCard (com_joltcard) component 1.2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cardID parameter in a view action to index.php.
Exploits (1)
References (7)
Core 7
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/12269
Exploit x_refsource_misc
http://www.xenuser.org/documents/security/joomla_com_joltcard_sqli.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/39541
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/57910
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/39520
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/63913
Exploit x_refsource_misc
http://packetstormsecurity.org/1004-exploits/joomlajoltcard-sql.txt
Scores
EPSS
0.0051
EPSS Percentile
66.3%
Details
CWE
CWE-89
Status
published
Products (1)
jolt/com_joltcard
1.2.1
Published
Apr 23, 2010
Tracked Since
Feb 18, 2026