Page 7 of 66 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

10 Sep 2007 — administrator/index.php in the installer component (com_installer) in Joomla! 1.5 Beta1, Beta2, and RC1 allows remote authenticated administrators to upload arbitrary files to tmp/ via the "Upload Package File" functionality, which is accessible when com_installer is the value of the option parameter. administrator/index.php en el componente installer (com_installer) en Joomla! 1.5 Beta1, Beta2, y RC1 permite a administradores remotos validados actualizar archivos de su elección en tmp/ a través de la funci... • https://www.exploit-db.com/exploits/4350 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 11%CPEs: 1EXPL: 0

08 Aug 2007 — Multiple eval injection vulnerabilities in the com_search component in Joomla! 1.5 beta before RC1 (aka Mapya) allow remote attackers to execute arbitrary PHP code via PHP sequences in the searchword parameter, related to default_results.php in (1) components/com_search/views/search/tmpl/ and (2) templates/beez/html/com_search/search/. Múltiples vulnerabilidades de inyección en eval (evaluación directa de código dinámico) en el componente com_search de Joomla! 1.5 beta anterior a RC1 (también conocida como ... • http://joomlacode.org/gf/project/joomla/scmsvn/?action=browse&path=%2Fdevelopment%2Ftrunk%2Fcomponents%2Fcom_search%2Fviews%2Fsearch%2Fview.php&r1=7455&r2=7456 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 90%CPEs: 4EXPL: 4

24 Apr 2007 — PHP remote file inclusion vulnerability in lib/pcltar.lib.php (aka pcltar.php) in the PclTar module 1.3 and 1.3.1 for Vincent Blavet PhpConcept Library, as used in multiple products including (1) Joomla! 1.5.0 Beta, (2) N/X Web Content Management System (WCMS) 4.5, (3) CJG EXPLORER PRO 3.3, and (4) phpSiteBackup 0.1, allows remote attackers to execute arbitrary PHP code via a URL in the g_pcltar_lib_dir parameter. Una vulnerabilidad de inclusión remota de archivos PHP en lib/pcltar.lib.php (también se conoc... • https://www.exploit-db.com/exploits/3915 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 2

19 Jan 2007 — SQL injection vulnerability in (1) Joomla! 1.0.11 and 1.5 Beta, and (2) Mambo 4.6.1, allows remote attackers to execute arbitrary SQL commands via the id parameter when cancelling content editing. Vulnerabilidad de inyección SQL en (1) Joomla! 1.0.11 y 1.5 Beta, y (2) Mambo 4.6.1, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id cuando se cancela el editor de contenidos. • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

19 Jan 2007 — Joomla! 1.5.0 Beta allows remote attackers to obtain sensitive information via a direct request for (1) plugins/user/example.php; (2) gmail.php, (3) example.php, or (4) ldap.php in plugins/authentication/; (5) modules/mod_mainmenu/menu.php; or other unspecified PHP scripts, which reveals the path in various error messages, related to a jimport function call at the beginning of each script. Joomla! 1.5.0 Beta permite a atacantes remotos obtener información sensible a través de respuesta directa para (1) plug... • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 3

19 Jan 2007 — Multiple SQL injection vulnerabilities in Joomla! 1.5.0 Beta allow remote attackers to execute arbitrary SQL commands via (1) the searchword parameter in certain files; the where parameter in (2) plugins/search/content.php or (3) plugins/search/weblinks.php; the text parameter in (4) plugins/search/contacts.php, (5) plugins/search/categories.php, or (6) plugins/search/sections.php; or (7) the email parameter in database/table/user.php, which is not properly handled by the check function. Múltiples vulnerabi... • http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0355.html •