CVE-2008-5789 – Joomla! Component Feederator 1.0.5 - Multiple Remote File Inclusions
https://notcve.org/view.php?id=CVE-2008-5789
Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) mosConfig_absolute_path parameter to (a) add_tmsp.php, (b) edit_tmsp.php and (c) tmsp.php in includes/tmsp/; and the (2) GLOBALS[mosConfig_absolute_path] parameter to (d) includes/tmsp/subscription.php. Múltiples vulnerabilidades de inclusión remota de fichero en el componente Recly Interactive Feederator (com_feederator) v1.0.5 para Joomla!, permite a atacantes remotos ejecutar código PHP de su elección a través del parámetro (1) mosConfig_absolute_path parameter a (a) add_tmsp.php, (b) edit_tmsp.php y (c) tmsp.php en includes/tmsp/; y el parámetro (2) GLOBALS[mosConfig_absolute_path] a (d) includes/tmsp/subscription.php. • https://www.exploit-db.com/exploits/7040 http://securityreason.com/securityalert/4827 http://www.securityfocus.com/bid/32194 https://exchange.xforce.ibmcloud.com/vulnerabilities/46438 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-5793 – Joomla! Component ClickHeat 1.0.1 - Multiple Remote File Inclusions
https://notcve.org/view.php?id=CVE-2008-5793
Multiple PHP remote file inclusion vulnerabilities in the Clickheat - Heatmap stats (com_clickheat) component 1.0.1 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) GLOBALS[mosConfig_absolute_path] parameter to (a) install.clickheat.php, (b) Cache.php and (c) Clickheat_Heatmap.php in Recly/Clickheat/, and (d) Recly/common/GlobalVariables.php; and the (2) mosConfig_absolute_path parameter to (e) _main.php and (f) main.php in includes/heatmap, and (g) includes/overview/main.php. Múltiples vulnerabilidades de inclusión de archivo PHP remoto en el componente para Joomla! Clickheat - Heatmap stats (com_clickheat) v1.0.1, permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro (1) GLOBALS[mosConfig_absolute_path] de (a) install.clickheat.php, (b) Cache.php y (c) Clickheat_Heatmap.php en Recly/Clickheat/, y (d) Recly/common/GlobalVariables.php; y el parámetro (2) mosConfig_absolute_path de (e) _main.php y (f) main.php en includes/heatmap, y (g) includes/overview/main.php. • https://www.exploit-db.com/exploits/7038 http://securityreason.com/securityalert/4841 http://www.securityfocus.com/bid/32190 https://exchange.xforce.ibmcloud.com/vulnerabilities/46439 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2008-5643 – Joomla! Component com_books - 'book_id' SQL Injection
https://notcve.org/view.php?id=CVE-2008-5643
SQL injection vulnerability in the Books (com_books) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the book_id parameter in a book_details action to index.php. Vulnerabilidad de inyección SQL en el componente Books (com_books) para Joomla! permitiría a atacantes remotos ejecutar comandos SQL a su elección a través del parámetro book_id en la acción book_details en index.php. • https://www.exploit-db.com/exploits/7092 http://securityreason.com/securityalert/4774 http://www.securityfocus.com/bid/32255 https://exchange.xforce.ibmcloud.com/vulnerabilities/46561 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2008-4122
https://notcve.org/view.php?id=CVE-2008-4122
Joomla! 1.5.8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. Joomla! 1.5.8 no habilita el flag 'secure' para la cookie de la sesión en una sesión https, lo faciita a los atacantes remotos el capturar esta cookie interceptando su transmisión dentro de una sesión http. • http://int21.de/cve/CVE-2008-4122-joomla.html http://securityreason.com/securityalert/4794 http://www.securityfocus.com/archive/1/499295/100/0/threaded http://www.securityfocus.com/archive/1/499354/100/0/threaded • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2008-5607 – Joomla! Component JMovies 1.1 - 'id' SQL Injection
https://notcve.org/view.php?id=CVE-2008-5607
SQL injection vulnerability in the JMovies (aka JM or com_jmovies) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. Vulnerabilidad de inyeccion SQL en el componente JMovies v1.1 (anteriormente conocido como JM o com_jmovies) para Joomla! permite a atacantes remotos ejecutar comandos SQL a su elección a través del parámetro "id" a index.php • https://www.exploit-db.com/exploits/7331 http://securityreason.com/securityalert/4759 http://www.securityfocus.com/bid/32615 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •