{ "schema_version": "1.4.0", "id": "GHSA-7xqf-j5rr-m37g", "modified": "2022-05-14T02:41:53Z", "published": "2022-05-14T02:41:53Z", "aliases": [ "CVE-2010-5048" ], "details": "Cross-site scripting (XSS) vulnerability in admin.jcomments.php in the JoomlaTune JComments (com_jcomments) component 2.1.0.0 for Joomla! allows remote authenticated users to inject arbitrary web script or HTML via the name parameter to index.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-5048" }, { "type": "WEB", "url": "http://packetstormsecurity.org/1005-exploits/joomlajcomments-xss.txt" }, { "type": "WEB", "url": "http://secunia.com/advisories/39842" }, { "type": "WEB", "url": "http://www.htbridge.ch/advisory/xss_vulnerability_in_jcomments_joomla.html" }, { "type": "WEB", "url": "http://www.joomlatune.com/jcomments-v.2.2-release-notes.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/511320/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/40230" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-11-23T01:55:00Z" } }