1 results (0.015 seconds)

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 4

Directory traversal vulnerability in the Picasa (com_joomlapicasa2) component 2.0 and 2.0.5 for Joomla! allows remote attackers to read arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Una vulnerabilidad de salto de directorio en el componente Picasa (com_joomlapicasa2) versiones 2.0 y 2.0.5 para Joomla! • https://www.exploit-db.com/exploits/12058 http://packetstormsecurity.org/1004-exploits/joomlapicasa-lfi.txt http://secunia.com/advisories/39338 http://www.exploit-db.com/exploits/12058 http://www.securityfocus.com/bid/39200 https://exchange.xforce.ibmcloud.com/vulnerabilities/57508 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •