CVE-2008-0562 – Mambo Component Restaurant 1.0 - SQL Injection
https://notcve.org/view.php?id=CVE-2008-0562
SQL injection vulnerability in index.php in the Restaurant (com_restaurant) 1.0 component for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action. Vulnerabilidad de inyección SQL en index.php en el componente Restaurant (com_restaurant) 1.0 para Mambo and Joomla!. Permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro id en una acción de detalle. • https://www.exploit-db.com/exploits/5031 http://www.securityfocus.com/bid/27551 https://exchange.xforce.ibmcloud.com/vulnerabilities/40144 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2007-5451 – Joomla! Component com_colorlab 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5451
PHP remote file inclusion vulnerability in admin.color.php in the com_colorlab (aka com_color) 1.0 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.color.php en el componente para Joomla! com_colorlab (también conocido como com_color) 1.0 permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/4524 http://osvdb.org/40609 http://www.securityfocus.com/bid/26059 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5427 – Joomla! Component Search 1.0.13 - SearchWord Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2007-5427
Cross-site scripting (XSS) vulnerability in the com_search component in Joomla! 1.0.13 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchword parameter. NOTE: this might be related to CVE-2007-4189.1. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el componente de Joomla!, com_search 1.0.13 y versiones anteriores permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro searchword. NOTA: Este asunto podría estar relacionado con CVE-2007-4189.1. • https://www.exploit-db.com/exploits/30655 http://osvdb.org/37709 http://secunia.com/advisories/27196 http://securityreason.com/securityalert/3216 http://securityvulns.ru/Rdocument919.html http://websecurity.com.ua/1203 http://www.securityfocus.com/archive/1/482006/100/0/threaded http://www.securityfocus.com/bid/26031 http://www.vupen.com/english/advisories/2007/3495 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-5410 – Joomla! Component WebMaster-Tips.net Joomla! RSS Feed Reader 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5410
PHP remote file inclusion vulnerability in admin.wmtrssreader.php in the webmaster-tips.net Flash RSS Reader (com_wmtrssreader) 1.0 component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. Vulnerabilidad de inclusión remota de archivo en PHP en admin.wmtrssreader.php en el componente webmaster-tips.net Flash RSS Reader (com_wmtrssreader) 1.0 para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/30651 http://osvdb.org/43765 http://securityreason.com/securityalert/3211 http://www.securityfocus.com/archive/1/481979/100/0/threaded http://www.securityfocus.com/bid/25999 http://www.sibersavascilar.com/merhaba-dunya-1.html https://exchange.xforce.ibmcloud.com/vulnerabilities/37056 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-5363 – Joomla! Component panoramic 1.0 - Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-5363
PHP remote file inclusion vulnerability in admin.panoramic.php in the Panoramic Picture Viewer (com_panoramic) mambot (plugin) 1.0 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_live_site parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de inclusión remota de archivo en PHP en admin.panoramic.php del mambot (extenxión o plugin) Panoramic Picture Viewer 1.0 para Joomla! permite a atacantes remotos ejecutar código PHP de su elección mediante un URL en el parámetro a través del parámetro mosConfig_live_site. • https://www.exploit-db.com/exploits/4489 http://osvdb.org/38585 http://www.securityfocus.com/bid/25946 http://www.vupen.com/english/advisories/2007/3428 https://exchange.xforce.ibmcloud.com/vulnerabilities/36992 • CWE-94: Improper Control of Generation of Code ('Code Injection') •