2 results (0.014 seconds)

CVSS: 6.8EPSS: 2%CPEs: 2EXPL: 1

PHP remote file inclusion vulnerability in admin.wmtportfolio.php in the webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.wmtportfolio.php del componente webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/4497 http://osvdb.org/38644 http://www.securityfocus.com/bid/25959 https://exchange.xforce.ibmcloud.com/vulnerabilities/36993 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 6%CPEs: 2EXPL: 1

PHP remote file inclusion vulnerability in admin.wmtgallery.php in the webmaster-tips.net Flash Image Gallery (com_wmtgallery) 1.0 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.wmtgallery.php del componente para Joomla! webmaster-tips.net Flash Image Gallery (com_wmtgallery) 1.0, permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/4496 http://osvdb.org/38645 http://www.attrition.org/pipermail/vim/2007-October/001823.html http://www.attrition.org/pipermail/vim/2007-October/001824.html http://www.securityfocus.com/bid/25958 http://www.vupen.com/english/advisories/2007/3434 https://exchange.xforce.ibmcloud.com/vulnerabilities/37016 • CWE-94: Improper Control of Generation of Code ('Code Injection') •