
CVE-2008-4104
https://notcve.org/view.php?id=CVE-2008-4104
18 Sep 2008 — Multiple open redirect vulnerabilities in Joomla! 1.5 before 1.5.7 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a "passed in" URL. Múltiples vulnerabilidades involuntarias de redirección en Joomla! 1.5 anterior a 1.5.7; permiten a atacantes remotos redireccionar a los usuarios a sitios web de su elección y provocar ataques de phishing mediante una URL "de paso". • http://developer.joomla.org/security/news/274-20080904-core-redirect-spam.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2008-4105
https://notcve.org/view.php?id=CVE-2008-4105
18 Sep 2008 — JRequest in Joomla! 1.5 before 1.5.7 does not sanitize variables that were set with JRequest::setVar, which allows remote attackers to conduct "variable injection" attacks and have unspecified other impact. JRequest en Joomla! 1.5 y versiones anteriores a 1.5.7 limpia correctamente variable establecidas con JRequest::setVar, el cual permite a los atacante remotos realizar un ataque de "inyección de variable" y tiene otras consecuencias no especificadas. • http://developer.joomla.org/security/news/271-20080901-core-jrequest-variable-injection.html • CWE-20: Improper Input Validation •

CVE-2008-3225
https://notcve.org/view.php?id=CVE-2008-3225
18 Jul 2008 — Joomla! before 1.5.4 allows attackers to access administration functionality, which has unknown impact and attack vectors related to a missing "LDAP security fix." Versiones de Joomla! anteriores a 1.5.4 permiten a los atacantes el acceso a funciones de administración, con impacto desconocido y vectores de ataque relacionados con la falta de una actualizacion de seguridad de LDAP. • http://www.joomla.org/content/view/5180/1 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-3226
https://notcve.org/view.php?id=CVE-2008-3226
18 Jul 2008 — The file caching implementation in Joomla! before 1.5.4 allows attackers to access cached pages via unknown attack vectors. La implementación del caché de archivos en versiones de Joomla! anteriores a la 1.5.4 permite a los atacantes el acceso a páginas cacheadas a través de vectores de ataque desconocidos. • http://www.joomla.org/content/view/5180/1 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-3227
https://notcve.org/view.php?id=CVE-2008-3227
18 Jul 2008 — Unspecified vulnerability in Joomla! before 1.5.4 has unknown impact and attack vectors related to a "User Redirect Spam fix," possibly an open redirect vulnerability. Vulnerabilidad sin especificar en versiones de Joomla! anteriores a 1.5.4 tienen un impacto desconocido y vectores de ataque relacionados con un "parche para Spam de redireccionamiento de usuario", posiblemente una vulnerabilidad abierta de redirección. • http://www.joomla.org/content/view/5180/1 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2008-3228
https://notcve.org/view.php?id=CVE-2008-3228
18 Jul 2008 — Joomla! before 1.5.4 does not configure .htaccess to apply certain security checks that "block common exploits" to SEF URLs, which has unknown impact and remote attack vectors. Joomla! anterior a 1.5.4 no aplica a .htaccess determinados controles de seguridad que bloquean exploits comunes a URLs con el plugin SEF, lo cual tiene un impacto desconocido y vectores de ataque remotos. • http://www.joomla.org/content/view/5180/1 • CWE-16: Configuration •

CVE-2007-4778
https://notcve.org/view.php?id=CVE-2007-4778
10 Sep 2007 — Multiple SQL injection vulnerabilities in the content component (com_content) in Joomla! 1.5 Beta1, Beta2, and RC1 allow remote attackers to execute arbitrary SQL commands via the filter parameter in an archive action to (1) archive.php, (2) category.php, or (3) section.php in models/. NOTE: this may be the same as CVE-2007-4777. Múltiples vulnerabilidades de inyección SQL en el componente content (com_content) en Joomla! versión 1.5 Beta1, Beta2 y RC1, permite a atacantes remotos ejecutar comandos SQL arbi... • http://downloads.securityfocus.com/vulnerabilities/exploits/25508.php • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2007-4781 – Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection
https://notcve.org/view.php?id=CVE-2007-4781
10 Sep 2007 — administrator/index.php in the installer component (com_installer) in Joomla! 1.5 Beta1, Beta2, and RC1 allows remote authenticated administrators to upload arbitrary files to tmp/ via the "Upload Package File" functionality, which is accessible when com_installer is the value of the option parameter. administrator/index.php en el componente installer (com_installer) en Joomla! 1.5 Beta1, Beta2, y RC1 permite a administradores remotos validados actualizar archivos de su elección en tmp/ a través de la funci... • https://www.exploit-db.com/exploits/4350 • CWE-20: Improper Input Validation •

CVE-2007-2199 – CJG EXPLORER PRO 3.2 - 'g_pcltar_lib_dir' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2007-2199
24 Apr 2007 — PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter. Una vulnerabilidad de inclusión remota de archivos PHP en lib/pcltar.lib.php (también se conoc... • https://www.exploit-db.com/exploits/3915 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2007-0374
https://notcve.org/view.php?id=CVE-2007-0374
19 Jan 2007 — SQL injection vulnerability in (1) Joomla! 1.0.11 and 1.5 Beta, and (2) Mambo 4.6.1, allows remote attackers to execute arbitrary SQL commands via the id parameter when cancelling content editing. Vulnerabilidad de inyección SQL en (1) Joomla! 1.0.11 y 1.5 Beta, y (2) Mambo 4.6.1, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id cuando se cancela el editor de contenidos. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •