2 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

SQL injection vulnerability in the StaticXT (com_staticxt) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. Vulnerabilidad de inyección SQL en el componente StaticXT (com_staticxt) de Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id de index.php. • https://www.exploit-db.com/exploits/14395 http://packetstormsecurity.org/1007-exploits/joomlastaticxt-sql.txt http://www.exploit-db.com/exploits/14395 https://exchange.xforce.ibmcloud.com/vulnerabilities/60462 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 11%CPEs: 1EXPL: 2

Unspecified vulnerability in PollXT component (com_pollxt) 1.22.07 and earlier for Joomla! has unspecified impact and attack vectors, probably related to PHP remote file inclusion in the mosConfig_absolute_path to conf.pollxt.php. Vulnerabilidad no especificada en PollXT componente (com_pollxt) 1.22.07 y anteriores para Joomla! tiene un impacto no especificado y vectores de ataque. • https://www.exploit-db.com/exploits/2029 http://forum.joomla.org/index.php/topic%2C77975.0.html http://forum.joomla.org/index.php/topic%2C79477.0.html http://secunia.com/advisories/21068 http://www.securityfocus.com/bid/19037 http://www.vupen.com/english/advisories/2006/2843 https://exchange.xforce.ibmcloud.com/vulnerabilities/27779 • CWE-94: Improper Control of Generation of Code ('Code Injection') •