Page 6 of 29 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in mod_templatechooser in Joomla! 1.0.7 allows remote attackers to obtain sensitive information via an unspecified attack vector that reveals the path. • http://secunia.com/advisories/19105 http://www.joomla.org/content/view/938/78 http://www.osvdb.org/23818 http://www.vupen.com/english/advisories/2006/0818 https://exchange.xforce.ibmcloud.com/vulnerabilities/25028 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

feedcreator.class.php (aka the syndication component) in Joomla! 1.0.7 allows remote attackers to cause a denial of service (stressed file cache) by creating many files via filenames in the feed parameter to index.php. • http://secunia.com/advisories/19105 http://securityreason.com/securityalert/527 http://www.joomla.org/content/view/938/78 http://www.osvdb.org/23817 http://www.securityfocus.com/archive/1/426538/100/0/threaded •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

feedcreator.class.php (aka the syndication component) in Joomla! 1.0.7 allows remote attackers to obtain sensitive information via a "/" (slash) in the feed parameter to index.php, which reveals the path in an error message. • http://securityreason.com/securityalert/527 http://www.joomla.org/content/view/938/78 http://www.osvdb.org/23815 http://www.securityfocus.com/archive/1/426538/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/25028 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

The cross-site scripting (XSS) countermeasures in class.inputfilter.php in Joomla! 1.0.7 allow remote attackers to cause a denial of service via a crafted mosmsg parameter to index.php with a malformed sequence of multiple tags, as demonstrated using "<<>AAA<><>", possibly due to nested or empty tags. • http://www.joomla.org/content/view/938/78 http://www.osvdb.org/23816 http://www.securityfocus.com/archive/1/426538/100/0/threaded •