Page 74 of 804 results (0.007 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 3

PHP remote file inclusion vulnerability in the SEF404x (com_sef) component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig.absolute.path parameter to index.php. Vulnerabilidad de inclusion remota de archivo PHP en el componente para Joomla! SEF404x (com_sef) permite a atacantes remotos ejecutar código PHP arbitrario a través de una URL en el parámetro mosConfig.absolute.path a index.php. • https://www.exploit-db.com/exploits/14055 http://www.exploit-db.com/exploits/14055 http://www.securityfocus.com/bid/41166 http://www.vupen.com/english/advisories/2010/1619 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Realtyna Translator (com_realtyna) component 1.0.15 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Realtyna Translator (com_realtyna) v1.0.15 para Joomla!, permite a atacantes remotos leer ficheros arbitrarios y tener posiblemente otro tipo de impacto no especificado al utilizar caracteres .. • https://www.exploit-db.com/exploits/14017 http://packetstormsecurity.org/1004-exploits/joomlarealtyna-lfi.txt http://www.exploit-db.com/exploits/14017 http://www.securityfocus.com/bid/39337 https://exchange.xforce.ibmcloud.com/vulnerabilities/57647 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

SQL injection vulnerability in the Weblinks (com_weblinks) component in Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a view action to index.php. Vulnerabilidad de inyección SQL en el componente Weblinks (com_weblinks) de Joomla! permite a atacantes remotos ejecutar comandos SQL a través del parámetro id en una acción de vista a index.php. • https://www.exploit-db.com/exploits/33812 http://packetstormsecurity.org/1003-exploits/joomlaweblinks-sql.txt http://www.securityfocus.com/archive/1/510364/100/0/threaded http://www.securityfocus.com/bid/39032 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

SQL injection vulnerability in xmap (com_xmap) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the Itemid parameter to index.php. Vulnerabilidad de inyección SQL en el componente xmap (com_xmap) para Joomla! permite a atacantes remotos ejecutar comandos SQL a través del parámetro Itemid a index.php. • http://www.securityfocus.com/archive/1/510374/100/0/threaded http://www.securityfocus.com/bid/39035 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 3

SQL injection vulnerability in the Joomanager component, possibly 1.1.1, for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php. Una vulnerabilidad de inyección SQL en el componente Joomanager, posiblemente v1.1.1, para Joomla! permite a atacantes remotos ejecutar comandos SQL a través del parámetro catid de index.php. • https://www.exploit-db.com/exploits/14127 http://www.exploit-db.com/exploits/14127 http://www.securityfocus.com/bid/41256 https://exchange.xforce.ibmcloud.com/vulnerabilities/59945 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •