Page 136 of 804 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in the PcCookBook (com_pccookbook) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the recipe_id parameter in a viewrecipe action to index.php, a different vector than CVE-2008-0844. Vulnerabilidad de inyección SQL en el componente para Joomla! PcCookBook (com_pccookbook) que permitiría a atacantes remotos ejecutar comandos SQL a su elección a través del parámetro "recipe_id" en una acción viewrecipe en index.php, un vector diferente que CVE-2008-0844. • https://www.exploit-db.com/exploits/7824 http://www.securityfocus.com/bid/33346 https://exchange.xforce.ibmcloud.com/vulnerabilities/48088 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

SQL injection vulnerability in the WebAmoeba (WA) Ticket System (com_waticketsystem) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action to index.php. Vulnerabilidad de inyección SQL en el componente WebAmoeba (WA) Ticket System (com_waticketsystem) para Joomla! que permitiría atacantes remotos ejecutar comandos SQL a través del parámetro "catid" en la acción category a index.php • https://www.exploit-db.com/exploits/7833 http://secunia.com/advisories/33577 http://www.securityfocus.com/bid/33353 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

SQL injection vulnerability in the Mydyngallery (com_mydyngallery) component 1.4.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the directory parameter to index.php. Vulnerabilidad de inyección SQL en el componente Mydyngallery (com_mydyngallery) 1.4.2 para Joomla!, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "directory" a index.php. • https://www.exploit-db.com/exploits/7343 http://www.securityfocus.com/archive/1/498916/100/0/threaded http://www.securityfocus.com/bid/32639 https://exchange.xforce.ibmcloud.com/vulnerabilities/47087 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 2%CPEs: 30EXPL: 2

Directory traversal vulnerability in attachmentlibrary.php in the XStandard component for Joomla! 1.5.8 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the X_CMS_LIBRARY_PATH HTTP header. Vulnerabilidad de salto de directorio en attachmentlibrary.php en el componente XStandard para Joomla! v1.5.8 y versiones anteriores permite a atacantes remotos listar directorios de su elección a través de .. • https://www.exploit-db.com/exploits/7691 http://secunia.com/advisories/33377 http://securityreason.com/securityalert/4896 http://www.securityfocus.com/bid/33143 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 5

SQL injection vulnerability in the com_lowcosthotels component in the Hotel Booking Reservation System (aka HBS) for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a showhoteldetails action to index.php. Vulnerabilidad de inyección SQL en el componente com_lowcosthotels en Hotel Booking Reservation System (también conocido como HBS) para Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "id" en una acción showhoteldetails de index.php. • https://www.exploit-db.com/exploits/7575 https://www.exploit-db.com/exploits/7568 https://www.exploit-db.com/exploits/7567 http://securityreason.com/securityalert/4880 http://www.securityfocus.com/archive/1/499580/30/0/threaded http://www.securityfocus.com/bid/32952 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •