1 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 4

Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Highslide JS v1.5 y v2.0.9 para Joomla! • https://www.exploit-db.com/exploits/12086 http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt http://secunia.com/advisories/39359 http://www.exploit-db.com/exploits/12086 http://www.securityfocus.com/bid/39239 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •