Description
Multiple cross-site scripting (XSS) vulnerabilities in the RSComments (com_rscomments) component 1.0.0 Rev 2 for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) website and (2) name parameters to index.php.
Exploits (1)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/40977
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/59578
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/13935
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/40278
Exploit x_refsource_misc
http://packetstormsecurity.org/1006-exploits/joomlarscomments-xss.txt
Various Sources x_refsource_misc
http://www.rsjoomla.com/customer-support/documentations/96--general-overview-of-the-component/393-changelog.html
Scores
EPSS
0.0409
EPSS Percentile
88.6%
Details
CWE
CWE-79
Status
published
Products (1)
rsjoomla/com_rscomments
1.0.0 rev2
Published
Jun 25, 2010
Tracked Since
Feb 18, 2026