Page 158 of 804 results (0.011 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

The Admin Upload Image functionality in Joomla! before 1.0.11 allows remote authenticated users to upload files outside of the /images/stories/ directory via unspecified vectors. La funcionalidad Admin Upload Image en Joomla! anterior a 1.0.11 oernute a un usuario validaddo actualizar archivos fuera del diretorio /images/stories/ a través de vectores no especificados. • http://secunia.com/advisories/21666 http://www.joomla.org/content/view/1841/78 http://www.joomla.org/content/view/1843/74 http://www.vupen.com/english/advisories/2006/3408 https://exchange.xforce.ibmcloud.com/vulnerabilities/28630 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.8EPSS: 0%CPEs: 9EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Joomla! before 1.0.10 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters involving the (1) getUserStateFromRequest function, and the (2) SEF and (3) com_messages modules. Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Joomla! antes de 1.0.10 permiten a atacantes remotos inyectar secuencias de comandos web o HTML de su elección a través de parámetros no especificados que involucran a (1) la función getUserStateFromRequest y los módulos (2) SEF y (3) com_messages. • http://secunia.com/advisories/20874 http://www.joomla.org/content/view/1510/74 http://www.joomla.org/content/view/1511/78 http://www.osvdb.org/26913 http://www.osvdb.org/26917 http://www.osvdb.org/26918 http://www.securityfocus.com/bid/18742 http://www.vupen.com/english/advisories/2006/2608 https://exchange.xforce.ibmcloud.com/vulnerabilities/27521 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Multiple SQL injection vulnerabilities in Joomla! before 1.0.10 allow remote attackers to execute arbitrary SQL commands via unspecified parameters involving the (1) "Remember Me" function, (2) "Related Items" module, and the (3) "Weblinks submission". Múltiples vulnerabilidades de inyección SQL en Joomla! antes de 1.0.10 permiten a atacantes remotos ejecutar comandos SQL de su elección a través de parámetros no especificados que involucran (1) la función "Remember Me", (2) el módulo "Related Items" y (3) "Weblinks submission". • http://secunia.com/advisories/20874 http://www.joomla.org/content/view/1510/74 http://www.joomla.org/content/view/1511/78 http://www.osvdb.org/26910 http://www.osvdb.org/26911 http://www.osvdb.org/26912 http://www.securityfocus.com/bid/18742 http://www.vupen.com/english/advisories/2006/2608 https://exchange.xforce.ibmcloud.com/vulnerabilities/27520 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

PHP remote file inclusion vulnerability in includes/joomla.php in Joomla! 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the includepath parameter. • http://securityreason.com/securityalert/1074 http://securitytracker.com/id?1016269 http://www.securityfocus.com/archive/1/436707/100/0/threaded http://www.securityfocus.com/bid/18363 https://exchange.xforce.ibmcloud.com/vulnerabilities/27135 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 1

The com_rss option (rss.php) in (1) Mambo and (2) Joomla! allows remote attackers to cause a denial of service (disk consumption and possibly web-server outage) via multiple requests with different values of the feed parameter. • http://archives.neohapsis.com/archives/bugtraq/2006-04/0380.html http://irannetjob.com/content/view/209/28 http://www.kapda.ir/advisory-313.html http://www.securityfocus.com/archive/1/431317/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26131 • CWE-20: Improper Input Validation •