CVE-2006-5043 – Joomla! Component Joomlaboard 1.1.1 - 'sbp' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2006-5043
Multiple PHP remote file inclusion vulnerabilities in the Joomlaboard Forum Component (com_joomlaboard) before 1.1.2 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the sbp parameter to (1) file_upload.php or (2) image_upload.php, a variant of CVE-2006-3528. Múltiples vulnerabilidades de inclusión de archivo PHP remoto en el componente Joomlaboard Forum (com_joomlaboard) anterior a 1.1.2 para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro sbp a (1) file_upload.php o (2) image_upload.php, una variante de CVE-2006-3528. • https://www.exploit-db.com/exploits/3560 http://forum.joomla.org/index.php/topic%2C76852.0.html http://forum.joomla.org/index.php/topic%2C79477.0.html http://jext.info/builds/joomlaboard/joomlaboard-1.1.1-stable.tgz http://marc.info/?l=bugtraq&m=117468769820721&w=2 http://secunia.com/advisories/21059 http://www.howtoria.com/index.php?option=com_docman&task=doc_download&gid=32&Itemid=27 http://www.securityfocus.com/bid/23129 http://www.vupen.com/english/advisories/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-4472
https://notcve.org/view.php?id=CVE-2006-4472
Multiple unspecified vulnerabilities in Joomla! before 1.0.11 allow attackers to bypass user authentication via unknown vectors involving the (1) do_pdf command and the (2) emailform com_content task. Múltiples vulnerabilidades no especificadas en Joomla! anterior 1.0.11 permite a un atacante evitar la validación de usuario a través de vectores desconocidos que envuelven el comando (1)do_pdf y la tarea (2)emailform com_content. • http://secunia.com/advisories/21666 http://www.joomla.org/content/view/1841/78 http://www.joomla.org/content/view/1843/74 http://www.vupen.com/english/advisories/2006/3408 https://exchange.xforce.ibmcloud.com/vulnerabilities/28632 •
CVE-2006-4476
https://notcve.org/view.php?id=CVE-2006-4476
Multiple unspecified vulnerabilities in Joomla! before 1.0.11, related to "Injection Flaws," allow attackers to have an unknown impact via (1) globals.php, which uses include_once() instead of require(); (2) the $options variable; (3) Admin Upload Image; (4) ->load(); (5) content submissions when frontpage is selected; (6) the mosPageNav constructor; (7) saveOrder functions; (8) the absence of "exploit blocking rules" in htaccess; and (9) the ACL. Múltiples vulnerabilidades no especificadas en Joomla! 1.0.11, relacionados con "defectos de inyección," permite a un atacante tener un impacto deconocido a través de (1) globals.php, el cual usa include_once() en vez de require(); (2) la variable $options; (3) Admin Upload Image; (4) ->load(); (5) contienen presentación de contenidos cuando el se selecciona frontpage (6)el constructor mosPageNav; (7)la función saveOrder; (8) la ausencia de “reglas de bloqueo de exploits” en htaccess; y (9) el ACL. • http://secunia.com/advisories/21666 http://www.joomla.org/content/view/1841/78 http://www.joomla.org/content/view/1843/74 http://www.vupen.com/english/advisories/2006/3408 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-4470
https://notcve.org/view.php?id=CVE-2006-4470
Joomla! before 1.0.11 omits some checks for whether _VALID_MOS is defined, which allows attackers to have an unknown impact, possibly resulting in PHP remote file inclusion. Joomla! anterior a 1.0.11 omite algunas comprobaciones para si _VALID_MOS está definido, lo que permite que los atacantes tengan un impacto desconocido, posiblemente dando por resultado la inclusión remota de archivos PHP. • http://secunia.com/advisories/21666 http://www.joomla.org/content/view/1841/78 http://www.joomla.org/content/view/1843/74 http://www.vupen.com/english/advisories/2006/3408 https://exchange.xforce.ibmcloud.com/vulnerabilities/28631 •
CVE-2006-4474
https://notcve.org/view.php?id=CVE-2006-4474
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.0.11 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in (1) Admin Module Manager, (2) Admin Help, and (3) Search. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Joomla! anterior a 1.0.11 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante parámetros no especificados en (1) Módulo de Administración, (2) Ayuda de Administración y (3) Búsqueda. • http://secunia.com/advisories/21666 http://www.joomla.org/content/view/1841/78 http://www.joomla.org/content/view/1843/74 http://www.vupen.com/english/advisories/2006/3408 https://exchange.xforce.ibmcloud.com/vulnerabilities/28633 •