Page 14 of 66 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script. Joomla! 1.5.0 Beta permite a atacantes remotos obtener información sensible a través de respuesta directa para (1) plugins/user/example.php; (2) gmail.php, (3) example.php, o (4) ldap.php en plugins/authentication/; (5) modules/mod_mainmenu/menu.php; u otros scripts PHP no especificados, lo cual revela la ruta en varios mensajes de error, relacionado con la llamada a la función jimport al inicio de cada script. Joomla! • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html http://osvdb.org/32522 http://osvdb.org/32523 http://osvdb.org/32524 http://osvdb.org/32525 http://osvdb.org/32526 http://www.hackers.ir/advisories/festival.txt http://www.securityfocus.com/archive/1/459203/100/0/threaded •