4 results (0.003 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 4

Directory traversal vulnerability in the SmartSite (com_smartsite) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente SmartSite (com_smartsite) v1.0.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección al utilizar caracteres .. • https://www.exploit-db.com/exploits/12428 http://packetstormsecurity.org/1004-exploits/joomlasmartsite-lfi.txt http://secunia.com/advisories/39592 http://www.exploit-db.com/exploits/12428 http://www.securityfocus.com/bid/39740 http://www.vupen.com/english/advisories/2010/1006 https://exchange.xforce.ibmcloud.com/vulnerabilities/58175 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) mosConfig_absolute_path parameter to (a) add_tmsp.php, (b) edit_tmsp.php and (c) tmsp.php in includes/tmsp/; and the (2) GLOBALS[mosConfig_absolute_path] parameter to (d) includes/tmsp/subscription.php. Múltiples vulnerabilidades de inclusión remota de fichero en el componente Recly Interactive Feederator (com_feederator) v1.0.5 para Joomla!, permite a atacantes remotos ejecutar código PHP de su elección a través del parámetro (1) mosConfig_absolute_path parameter a (a) add_tmsp.php, (b) edit_tmsp.php y (c) tmsp.php en includes/tmsp/; y el parámetro (2) GLOBALS[mosConfig_absolute_path] a (d) includes/tmsp/subscription.php. • https://www.exploit-db.com/exploits/7040 http://securityreason.com/securityalert/4827 http://www.securityfocus.com/bid/32194 https://exchange.xforce.ibmcloud.com/vulnerabilities/46438 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in the Recly!Competitions (com_competitions) component 1.0 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) add.php and (b) competitions.php in includes/competitions/, and the (2) mosConfig_absolute_path parameter to (c) includes/settings/settings.php. Múltiples vulnerabilidades de inclusión remota de fichero PHP en el componente Recly!Competitions v1.0 (com_competitions) para Joomla! • https://www.exploit-db.com/exploits/7039 http://www.securityfocus.com/bid/32192 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 2%CPEs: 2EXPL: 2

Multiple PHP remote file inclusion vulnerabilities in the Clickheat - Heatmap stats (com_clickheat) component 1.0.1 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) install.clickheat.php, (b) Cache.php and (c) Clickheat_Heatmap.php in Recly/Clickheat/, and (d) Recly/common/GlobalVariables.php; and the (2) mosConfig_absolute_path parameter to (e) _main.php and (f) main.php in includes/heatmap, and (g) includes/overview/main.php. Múltiples vulnerabilidades de inclusión de archivo PHP remoto en el componente para Joomla! Clickheat - Heatmap stats (com_clickheat) v1.0.1, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro (1) GLOBALS[mosConfig_absolute_path] de (a) install.clickheat.php, (b) Cache.php y (c) Clickheat_Heatmap.php en Recly/Clickheat/, y (d) Recly/common/GlobalVariables.php; y el parámetro (2) mosConfig_absolute_path de (e) _main.php y (f) main.php en includes/heatmap, y (g) includes/overview/main.php. • https://www.exploit-db.com/exploits/7038 http://securityreason.com/securityalert/4841 http://www.securityfocus.com/bid/32190 https://exchange.xforce.ibmcloud.com/vulnerabilities/46439 • CWE-94: Improper Control of Generation of Code ('Code Injection') •