10 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Directory traversal vulnerability in includes/file_includer.php in the Ideal MooFAQ (com_moofaq) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. Vulnerabilidad de salto de directorio en includes/file_includer.php en el componente Ideal MooFAQ (com_moofaq) v1.0 para Joomla! permite a atacantes remotos leer ficheros de su elección mediante un .. • https://www.exploit-db.com/exploits/8898 http://secunia.com/advisories/35370 http://www.securityfocus.com/bid/35259 http://www.vupen.com/english/advisories/2009/1530 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 25EXPL: 1

Incomplete blacklist vulnerability in Ideal Science Ideal BB 1.5.4a and earlier allows remote attackers to upload and execute an ASP script via a ".asa" file, which bypasses the check for the ".asp" extension but is executable on the server. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045887.html http://secunia.com/advisories/20035 http://securityreason.com/securityalert/871 http://www.idealscience.com/ibb/posts.aspx?postID=24415 http://www.osvdb.org/25456 http://www.securityfocus.com/archive/1/433248/100/0/threaded http://www.securityfocus.com/bid/17920 http://www.vupen.com/english/advisories/2006/1729 https://exchange.xforce.ibmcloud.com/vulnerabilities/26353 •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

Multiple SQL injection vulnerabilities in Ideal Science Ideal BB 1.5.4a and earlier allow remote attackers to execute arbitrary SQL commands via multiple unspecified vectors related to stored procedure calls. NOTE: due to lack of details from the researcher, it is not clear whether this overlaps CVE-2004-2209. • http://secunia.com/advisories/20035 http://securityreason.com/securityalert/871 http://www.idealscience.com/ibb/posts.aspx?postID=24415 http://www.osvdb.org/25457 http://www.securityfocus.com/archive/1/433248/100/0/threaded http://www.securityfocus.com/bid/17920 http://www.vupen.com/english/advisories/2006/1729 https://exchange.xforce.ibmcloud.com/vulnerabilities/26354 •

CVSS: 5.0EPSS: 1%CPEs: 16EXPL: 0

Unspecified vulnerability in Ideal Science Ideal BB 1.5.4a and earlier allows remote attackers to read arbitrary files under the web root via unspecified attack vectors related to the OpenTextFile method in Scripting.FileSystemObject. • http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0203.html http://secunia.com/advisories/20035 http://securityreason.com/securityalert/871 http://www.idealscience.com/ibb/posts.aspx?postID=24415 http://www.osvdb.org/25455 http://www.securityfocus.com/archive/1/433248/100/0/threaded http://www.securityfocus.com/bid/17920 http://www.vupen.com/english/advisories/2006/1729 https://exchange.xforce.ibmcloud.com/vulnerabilities/26348 •

CVSS: 5.0EPSS: 3%CPEs: 16EXPL: 0

Ideal Science Ideal BB 1.5.4a and earlier does not properly check file extensions before permitting an upload, which allows remote attackers to upload and execute an ASP script via a 0x00 character before the ".asp" portion of the filename. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/045887.html http://secunia.com/advisories/20035 http://securityreason.com/securityalert/871 http://www.idealscience.com/ibb/posts.aspx?postID=24415 http://www.osvdb.org/25456 http://www.securityfocus.com/archive/1/433248/100/0/threaded http://www.securityfocus.com/bid/17920 http://www.vupen.com/english/advisories/2006/1729 https://exchange.xforce.ibmcloud.com/vulnerabilities/26353 •