Page 3 of 16 results (0.022 seconds)

CVSS: 7.5EPSS: 1%CPEs: 21EXPL: 0

PHP remote file inclusion vulnerability in contentpublisher.php in the contentpublisher component (com_contentpublisher) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by third parties who state that contentpublisher.php protects against direct request in the most recent version. The original researcher is known to be frequently inaccurate ** IMPUGNADA ** Vulnerabilidad de inclusión remota de archivo en PHP en contentpublisher.php del componente contentpublisher (com_contentpublisher) para Mambo permite a atacantes remotos ejecutar código PHP de su elección mediante una URL en el parámetro mosconfig_absolute_path. NOTA: Esta vulnerabilidad ha sido impugnada por terceros que establecen que el contentpublisher.php está protegido contra peticiones directas en la versión más reciente. El investigador original es conocido por ser frecuentemente impreciso. • http://securityreason.com/securityalert/1431 http://www.osvdb.org/28093 http://www.securityfocus.com/archive/1/443626/100/0/threaded http://www.securityfocus.com/archive/1/444244/100/0/threaded •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 3

SQL injection vulnerability in the Weblinks module (weblinks.php) in Mambo 4.6rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the title parameter. Vulnerabilidad de inyección SQL en el modulo Weblinks (weblinks.php) en Mambo v4.6rc1 y anteriores permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro "title". • https://www.exploit-db.com/exploits/1920 https://www.exploit-db.com/exploits/1941 http://retrogod.altervista.org/mambo_46rc1_sql.html http://secunia.com/advisories/20745 http://securityreason.com/securityalert/1158 http://securitytracker.com/id?1016334 http://www.mamboserver.com/?option=com_content&task=view&id=207 http://www.osvdb.org/26624 http://www.securityfocus.com/archive/1/437496/100/100/threaded http://www.securityfocus.com/bid/18492 http://www.vupen.com/englis •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in the Weblinks module (weblinks.php) in Mambo 4.6rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter. Vulnerabilidad de inyección SQL en el modulo Weblinks (weblinks.php) en Mambo v4.6rc1 y anteriores permite a atacantes remotos ejecutar comandos SQL arbitrarios a través del parámetro "catid". • http://www.mamboserver.com/?option=com_content&task=view&id=207 •

CVSS: 7.6EPSS: 1%CPEs: 16EXPL: 4

SQL injection vulnerability in Mambo 4.5.3, 4.5.3h, and possibly earlier versions allows remote attackers to execute arbitrary SQL commands via (1) the $username variable in the mosGetParam function and (2) the $task parameter in the mosMenuCheck function in (a) includes/mambo.php; and (3) the $filter variable to the showCategory function in the com_content component (content.php). • https://www.exploit-db.com/exploits/43835 http://archives.neohapsis.com/archives/bugtraq/2006-02/0463.html http://secunia.com/advisories/18935 http://source.mambo-foundation.org/view/news/Announcements/Security_Patch_Released http://www.gulftech.org/?node=research&article_id=00104-02242006 http://www.osvdb.org/23402 http://www.osvdb.org/23503 http://www.securityfocus.com/bid/16775 http://www.vupen.com/english/advisories/2006/0719 https://exchange.xforce.ibmcloud.com/vulnerabilities •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 1

SQL injection vulnerability in content.php in Mambo 4.5.2.2 and earlier allows remote attackers to execute arbitrary SQL commands via the user_rating parameter. • https://www.exploit-db.com/exploits/1049 http://mamboforge.net/frs/download.php/6153/CHANGELOG http://marc.info/?l=bugtraq&m=111885974124936&w=2 http://secunia.com/advisories/15710 http://securitytracker.com/id?1014222 http://www.osvdb.org/17323 http://www.securityfocus.com/bid/13966 •