2 results (0.010 seconds)

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 1

Arbitrary file upload exists in the Jimtawl 2.1.6 and 2.2.5 component for Joomla! via a view=upload&task=upload&pop=true&tmpl=component request. Existe una vulnerabilidad de subida de archivos arbitrarios en el componente Jimtawl 2.1.6 y 2.2.5 para Joomla! mediante la petición view=uploadtask=uploadpop=truetmpl=component. Joomla! • https://www.exploit-db.com/exploits/43958 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Jimtawl (com_jimtawl) component 1.0.2 Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the task parameter to index.php. Vulnerabilidad de salto de directorio en el componente Jimtawl (com_jimtawl) 1.0.2 de Joomla!. Permite a atacantes remotos leer archivos arbitrarios y posiblemente tener un impacto no especificado a través de un .. • https://www.exploit-db.com/exploits/15585 http://secunia.com/advisories/42324 http://www.exploit-db.com/exploits/15585 http://www.securityfocus.com/bid/44992 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •