Page 107 of 804 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

SQL injection vulnerability in the JoomlaBamboo (JB) Simpla Admin template for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an article action to the com_content component, reachable through index.php. NOTE: the vendor disputes this report, saying: "JoomlaBamboo has investigated this report, and it is incorrect. There is no SQL injection vulnerability involving the id parameter in an article view, and there never was. JoomlaBamboo customers have no reason to be concerned about this report. ** DISPUTADA ** Vulnerabilidad de inyección SQL en la plantilla JoomlaBamboo (JB) Simpla Admin para Joomla! • https://www.exploit-db.com/exploits/10971 http://packetstormsecurity.org/1001-exploits/joomlabamboo-sql.txt http://www.attrition.org/pipermail/vim/2010-February/002319.html http://www.attrition.org/pipermail/vim/2010-February/002320.html http://www.exploit-db.com/exploits/10971 http://www.securityfocus.com/bid/37579 http://www.vupen.com/english/advisories/2010/0014 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 4

SQL injection vulnerability in the BeeHeard (com_beeheard) component 1.x for Joomla! allows remote attackers to execute arbitrary SQL commands via the category_id parameter in a suggestions action to index.php. Vulnerabilidad de inyección SQL en el componente BeeHeard (com_beeheard) v1.x para Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro category_id en una acción suggestions en index.php. • https://www.exploit-db.com/exploits/10734 http://packetstormsecurity.org/0912-exploits/joomlabeeheard-sql.txt http://secunia.com/advisories/37872 http://www.exploit-db.com/exploits/10734 http://www.osvdb.org/61355 http://www.securityfocus.com/bid/37495 https://exchange.xforce.ibmcloud.com/vulnerabilities/55135 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 4

Cross-site scripting (XSS) vulnerability in the Facileforms (com_facileforms) component for Joomla! and Mambo allows remote attackers to inject arbitrary web script or HTML via the Itemid parameter to index.php. Vulnerabilidad de secuencias de comandos (XSS) en el componente Facileforms (com_facileforms) para Joomla! y Mambo permite a atacantes inyectar código web o HTMl de su elección a través del parámetro ITemid en idenx.php. • https://www.exploit-db.com/exploits/10737 http://packetstormsecurity.org/0912-exploits/joomlafacileforms-xss.txt http://www.exploit-db.com/exploits/10737 http://www.securityfocus.com/bid/37477 https://exchange.xforce.ibmcloud.com/vulnerabilities/55133 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 3

Cross-site scripting (XSS) vulnerability in the Q-Personel (com_qpersonel) component 1.0.2 RC2 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the personel_sira parameter in a sirala action to index.php. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados en el componente Q-Personel (com_qpersonel) 1.0.2 RC2 para Joomla!, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través del parámetro personale_sira en una acción sirala al index.php. • https://www.exploit-db.com/exploits/10738 http://secunia.com/advisories/37897 http://www.exploit-db.com/exploits/10738 http://www.osvdb.org/61354 http://www.securityfocus.com/bid/37503 https://exchange.xforce.ibmcloud.com/vulnerabilities/55128 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Bible Study (com_biblestudy) component 6.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter in a studieslist action to index.php. Vulnerabilidad de salto de directorio en el componente Bible Study (com_biblestudy) v6.1 para Joomla! permite a atacantes remotos incluir y ejecutar ficheros locales de su elección a través de un .. • https://www.exploit-db.com/exploits/10943 http://packetstormsecurity.org/1001-exploits/joomlabiblestudy-lfi.txt http://secunia.com/advisories/37896 http://www.securityfocus.com/bid/37583 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •