Page 4 of 44 results (0.003 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

12 Jun 2006 — PHP remote file inclusion vulnerability in includes/joomla.php in Joomla! 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the includepath parameter. • http://securityreason.com/securityalert/1074 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

21 Apr 2006 — The com_rss option (rss.php) in (1) Mambo and (2) Joomla! allows remote attackers to obtain sensitive information via an invalid feed parameter, which reveals the path in an error message. • http://irannetjob.com/content/view/209/28 •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 0

07 Mar 2006 — Unspecified vulnerability in the "Remember Me login functionality" in Joomla! 1.0.7 and earlier has unknown impact and attack vectors. • http://www.joomla.org/content/view/938/78 •

CVSS: 9.1EPSS: 0%CPEs: 8EXPL: 0

07 Mar 2006 — Joomla! 1.0.7 and earlier allows attackers to bypass intended access restrictions and gain certain privileges via certain attack vectors related to the (1) Weblink, (2) Polls, (3) Newsfeeds, (4) Weblinks, (5) Content, (6) Content Section, (7) Content Category, (8) Contact items, or (9) Contact Search, (10) Content Search, (11) Newsfeed Search, or (12) Weblink Search. • http://secunia.com/advisories/19105 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

07 Mar 2006 — Multiple SQL injection vulnerabilities in the Admin functionality in Joomla! 1.0.7 and earlier allow remote authenticated administrators to execute arbitrary SQL commands via unknown attack vectors. • http://secunia.com/advisories/19105 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

07 Mar 2006 — Unspecified vulnerability in mod_templatechooser in Joomla! 1.0.7 allows remote attackers to obtain sensitive information via an unspecified attack vector that reveals the path. • http://secunia.com/advisories/19105 •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

07 Mar 2006 — feedcreator.class.php (aka the syndication component) in Joomla! 1.0.7 allows remote attackers to obtain sensitive information via a "/" (slash) in the feed parameter to index.php, which reveals the path in an error message. • http://securityreason.com/securityalert/527 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

07 Mar 2006 — feedcreator.class.php (aka the syndication component) in Joomla! 1.0.7 allows remote attackers to cause a denial of service (stressed file cache) by creating many files via filenames in the feed parameter to index.php. • http://secunia.com/advisories/19105 •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

07 Mar 2006 — The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags. • http://www.joomla.org/content/view/938/78 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

19 Jan 2006 — Multiple unspecified vulnerabilities in the (1) publishing component, (2) Contact Component, (3) TinyMCE Compressor, and (4) other components in Joomla! 1.0.5 and earlier have unknown impact and attack vectors. • http://secunia.com/advisories/18513 •