Page 2 of 7 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Realtyna Translator (com_realtyna) v1.0.15 para Joomla!, permite a atacantes remotos leer ficheros arbitrarios y tener posiblemente otro tipo de impacto no especificado al utilizar caracteres .. • https://www.exploit-db.com/exploits/14017 http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txt http://www.exploit-db.com/exploits/14017 http://www.securityfocus.com/bid/39337 https://exchange.xforce.ibmcloud.com/vulnerabilities/57647 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 20EXPL: 3

Directory traversal vulnerability in the Magic Updater (com_joomlaupdater) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Magic Updater (com_joomlaupdater) para Joomla! permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12070 http://packetstormsecurity.org/1004-exploits/joomlaupdater-lfi.txt http://secunia.com/advisories/39348 http://www.exploit-db.com/exploits/12070 http://www.securityfocus.com/bid/39207 http://www.vupen.com/english/advisories/2010/0806 https://exchange.xforce.ibmcloud.com/vulnerabilities/57531 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •