CVE-2007-5389
https://notcve.org/view.php?id=CVE-2007-5389
PHP remote file inclusion vulnerability in preview.php in the swMenuFree (com_swmenufree) 4.6 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: a reliable third party disputes this issue because preview.php tests a certain constant to prevent direct requests ** IMPUGNADA ** Vulnerabilidad de inclusión remota de archivo en PHP en el preview.php del componente para Joomla! swMenuFree (com_swmenufree) 4.6 permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro mosConfig_absolute_path. NOTA: una tercera parte confiable impugna esta vulnerabilidad porque el preview.php prueba ciertas constantes para prevenir las peticiones directas. • http://osvdb.org/37903 http://securityreason.com/securityalert/3210 http://www.attrition.org/pipermail/vim/2007-October/001825.html http://www.securityfocus.com/archive/1/482100/100/0/threaded http://www.securityfocus.com/archive/1/482165/100/0/threaded • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5362 – Joomla! Component mosmedialite451 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5362
Multiple PHP remote file inclusion vulnerabilities in the Avant-Garde Solutions MOSMedia Lite (com_mosmedia) 4.5.1 component for Mambo and Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter to (1) credits.html.php, (2) info.html.php, (3) media.divs.php, (4) media.divs.js.php, (5) purchase.html.php, or (6) support.html.php in includes/. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: vector 3 may be the same as CVE-2007-2043.2. Múltiples vulnerabilidades de inclusión remota de archivo en PHP en el componente Avant-Garde Solutions MOSMedia Lite (com_mosmedi) 4.5.1 para Mambo y Joomla! • https://www.exploit-db.com/exploits/4499 http://osvdb.org/38586 http://osvdb.org/38587 http://osvdb.org/38588 http://www.securityfocus.com/bid/25960 https://exchange.xforce.ibmcloud.com/vulnerabilities/37015 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5363 – Joomla! Component panoramic 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5363
PHP remote file inclusion vulnerability in admin.panoramic.php in the Panoramic Picture Viewer (com_panoramic) mambot (plugin) 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de inclusión remota de archivo en PHP en admin.panoramic.php del mambot (extenxión o plugin) Panoramic Picture Viewer 1.0 para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro a través del parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/4489 http://osvdb.org/38585 http://www.securityfocus.com/bid/25946 http://www.vupen.com/english/advisories/2007/3428 https://exchange.xforce.ibmcloud.com/vulnerabilities/36992 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5310 – Joomla! Component wmtportfolio 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5310
PHP remote file inclusion vulnerability in admin.wmtportfolio.php in the webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.wmtportfolio.php del componente webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_absolute_path. • https://www.exploit-db.com/exploits/4497 http://osvdb.org/38644 http://www.securityfocus.com/bid/25959 https://exchange.xforce.ibmcloud.com/vulnerabilities/36993 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5309 – Joomla! Component Flash Image Gallery - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5309
PHP remote file inclusion vulnerability in admin.wmtgallery.php in the webmaster-tips.net Flash Image Gallery (com_wmtgallery) 1.0 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.wmtgallery.php del componente para Joomla! webmaster-tips.net Flash Image Gallery (com_wmtgallery) 1.0, permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/4496 http://osvdb.org/38645 http://www.attrition.org/pipermail/vim/2007-October/001823.html http://www.attrition.org/pipermail/vim/2007-October/001824.html http://www.securityfocus.com/bid/25958 http://www.vupen.com/english/advisories/2007/3434 https://exchange.xforce.ibmcloud.com/vulnerabilities/37016 • CWE-94: Improper Control of Generation of Code ('Code Injection') •