Page 7 of 66 results (0.009 seconds)

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en wmi.php en el componente Webmoney Web Merchant Interface (alias WMI o com_wmi) v1.5.0 para Joomla! permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. • https://www.exploit-db.com/exploits/12316 http://osvdb.org/63979 http://secunia.com/advisories/39539 http://www.exploit-db.com/exploits/12316 http://www.securityfocus.com/bid/39608 https://exchange.xforce.ibmcloud.com/vulnerabilities/58032 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente AddressBook (com_addressbook) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12170 http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt http://secunia.com/advisories/39412 http://www.exploit-db.com/exploits/12170 http://www.vupen.com/english/advisories/2010/0862 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Daily Horoscope (com_horoscope) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12167 http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt http://secunia.com/advisories/39406 http://www.exploit-db.com/exploits/12167 http://www.vupen.com/english/advisories/2010/0859 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 3

Directory traversal vulnerability in jresearch.php in the J!Research (com_jresearch) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una vulnerabilidad de salto de directorio en jresearch.php en el componente J! • https://www.exploit-db.com/exploits/33797 http://osvdb.org/63147 http://packetstormsecurity.org/1003-exploits/joomlajresearch-lfi.txt http://secunia.com/advisories/39079 http://www.securityfocus.com/bid/38917 https://exchange.xforce.ibmcloud.com/vulnerabilities/57123 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 2%CPEs: 13EXPL: 2

Directory traversal vulnerability in the Community Polls (com_communitypolls) component 1.5.2, and possibly earlier, for Core Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Community Polls (com_communitypolls) v1.5.2, y posiblemente anteriores, para Core Joomla! permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/11511 http://osvdb.org/62506 http://packetstormsecurity.org/1002-exploits/joomlacp-lfi.txt http://secunia.com/advisories/38692 http://www.corejoomla.com/component/content/article/1-corejoomla-updates/40-community-polls-v153-security-release.html http://www.securityfocus.com/bid/38330 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •