Page 4 of 27 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

SQL Injection exists in the Gallery WD 1.3.6 component for Joomla! via the tag_id parameter or gallery_id parameter. Existe inyección SQL en el componente Gallery WD 1.3.6 para Joomla! mediante los parámetros tag_id o gallery_id. Joomla! • https://www.exploit-db.com/exploits/44112 https://exploit-db.com/exploits/44112 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

SQL Injection exists in the Form Maker 3.6.12 component for Joomla! via the id, from, or to parameter in a view=stats request, a different vulnerability than CVE-2015-2798. Existe inyección SQL en el componente Form Maker 3.6.12 para Joomla! mediante los parámetros id, from o to en una petición view=stats; este problema es diferente de CVE-2015-2798. Joomla! • https://www.exploit-db.com/exploits/44111 https://exploit-db.com/exploits/44111 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

SQL injection vulnerability in Joomla! Component Contact Form Maker 1.0.1 allows remote attackers to execute arbitrary SQL commands via the id parameter. Vulnerabilidad de inyección SQL en Componente Contact Form Maker versión 1.0.1 de Joomla!, permite a los atacantes remotos ejecutar comandos SQL arbitrarios por medio del parámetro id. • https://www.exploit-db.com/exploits/36561 http://www.securityfocus.com/bid/73903 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting vulnerability in Event Calendar WD prior to version 1.0.94 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad de tipo Cross-site scripting en Event Calendar WD anterior a la versión 1.0.94, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de vectores no especificados. The EventCalendar plugin for WordPress is vulnerable to Cross-Site Scripting in versions before 1.0.94 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. • http://www.securityfocus.com/bid/99155 https://jvn.jp/en/jp/JVN73550134/index.html https://plugins.trac.wordpress.org/changeset/1671891/#file313 https://wordpress.org/plugins/event-calendar-wd/#developers https://wpvulndb.com/vulnerabilities/8859 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

SQL injection in the Spider Event Calendar (aka spider-event-calendar) plugin before 1.5.52 for WordPress is exploitable with the order_by parameter to calendar_functions.php or widget_Theme_functions.php, related to front_end/frontend_functions.php. La función read_u32_leb128 en libr/util/uleb128.c en radare2 1.3.0 permite a los atacantes remotos provocar una denegación de servicio (sobrecarga de búfer basada en heap y bloqueo de aplicación) a través de un archivo de ensamblaje Web manipulado. • http://lists.openwall.net/full-disclosure/2017/04/09/1 http://www.securityfocus.com/bid/97656 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •