Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2014-11-04 07:55
Updated : 2020-07-06 12:45
NVD link : CVE-2014-5387
Mitre link : CVE-2014-5387
JSON object : View
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
                expressionengine
- expressionengine
 
ellislab
- expressionengine
 


