Page 4 of 62 results (0.002 seconds)

CVSS: 9.8EPSS: 39%CPEs: 1EXPL: 0

08 Aug 2007 — Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/. Múltiples vulnerabilidades de inyección en eval (evaluación directa de código dinámico) en el componente com_search de Joomla! 1.5 beta anterior a RC1 (también conocida como ... • http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopment%2Ftrunk%2Fcomponents%2Fcom_search%2Fviews%2Fsearch%2Fview.php&r1=7455&r2=7456 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 90%CPEs: 4EXPL: 4

24 Apr 2007 — PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter. Una vulnerabilidad de inclusión remota de archivos PHP en lib/pcltar.lib.php (también se conoc... • https://www.exploit-db.com/exploits/3915 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2007 — Unspecified vulnerability in Joomla! before 1.0.10 has unknown impact and attack vectors, related to "securing mosmsg from misuse." NOTE: it is possible that this issue overlaps CVE-2006-1029. Vulnerabilidad no especificada en Joomla! anterior a 1.0.10 tiene impacto y vectores de ataque desconocidos, relacionados con "asegurar mosmsg contra el mal uso". • http://secunia.com/advisories/20874 •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2007 — Joomla! before 1.0.10 allows remote attackers to spoof the frontend submission forms, which has unknown impact and attack vectors. Joomla! anterior a 1.0.10 permite a atacantes remotos falsear los formularios de envío del interfaz externo (frontend), lo cual tiene impacto y vectores de ataque desconocidos. • http://secunia.com/advisories/20874 •

CVSS: 9.8EPSS: 0%CPEs: 10EXPL: 0

12 Feb 2007 — The mosgetparam implementation in Joomla! before 1.0.10, does not set a variable's data type to integer when the variable's default value is numeric, which has unspecified impact and attack vectors, which may permit SQL injection attacks. La implementación de mosgetparam en Joomla! anterior a 1.0.10, no establece el tipo de dato de una variable a entero cuando el valor por defecto de la variable es numérico, lo cual tiene impacto y vectores de ataque no especificados, que pueden permitir ataques de inyecció... • http://secunia.com/advisories/20874 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 3

19 Jan 2007 — Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function. Múltiples vulnerabi... • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 2

19 Jan 2007 — SQL injection vulnerability in (1) Joomla! 1.0.11 and 1.5 Beta, and (2) Mambo 4.6.1, allows remote attackers to execute arbitrary SQL commands via the id parameter when cancelling content editing. Vulnerabilidad de inyección SQL en (1) Joomla! 1.0.11 y 1.5 Beta, y (2) Mambo 4.6.1, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id cuando se cancela el editor de contenidos. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

19 Jan 2007 — Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script. Joomla! 1.5.0 Beta permite a atacantes remotos obtener información sensible a través de respuesta directa para (1) plug... • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVSS: 6.1EPSS: 0%CPEs: 11EXPL: 0

31 Dec 2006 — Cross-site scripting (XSS) vulnerability in Joomla! before 1.0.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to poll.php or the module title. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Joomla! anterior a 1.0.12 permite a un atacante remoto inyectar secuencias de comandos web o HTML a través de vectores no especificados, posiblemente relacionados con poll.php o el módulo title. • http://forge.joomla.org/sf/go/artf5985?nav=1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 11EXPL: 0

31 Dec 2006 — com_categories in Joomla! before 1.0.12 does not validate input, which has unknown impact and remote attack vectors. com_categories en Joomla! anterior a 1.0.12 no valida la entrada, lo cual tiene un impacto desconocido y ataques remotos en vectores. • http://jvn.jp/jp/JVN%2345006961/index.html •