Page 8 of 59 results (0.012 seconds)

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Online Market (com_market) v2.x para Joomla!, permite a atacantes remotos leer archivos a su elección y posiblemente tener otro impacto no especificado a través de .. • https://www.exploit-db.com/exploits/12177 http://packetstormsecurity.org/1004-exploits/joomlaonlinemarket-lfi.txt http://secunia.com/advisories/39409 http://www.exploit-db.com/exploits/12177 http://www.osvdb.org/63671 https://exchange.xforce.ibmcloud.com/vulnerabilities/57674 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Arcade Games (com_arcadegames) v1.0 para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12168 http://packetstormsecurity.org/1004-exploits/joomlaarcadegames-lfi.txt http://secunia.com/advisories/39413 http://www.exploit-db.com/exploits/12168 http://www.osvdb.org/63660 http://www.vupen.com/english/advisories/2010/0860 https://exchange.xforce.ibmcloud.com/vulnerabilities/57683 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Web TV (com_webtv) component 1.0 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Web TV (com_webtv) v1.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente tener otros efectos no determinados a través de los caracteres ".." • https://www.exploit-db.com/exploits/12166 http://packetstormsecurity.org/1004-exploits/joomlawebtv-lfi.txt http://secunia.com/advisories/39405 http://www.exploit-db.com/exploits/12166 http://www.vupen.com/english/advisories/2010/0858 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

SQL injection vulnerability in diary_viewC.asp in ASP-DEv XM Events Diary allows remote attackers to execute arbitrary SQL commands via the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de inyección SQL en diary_viewC.asp in ASP-DEv XM Events Diary permite a atacantes remotos ejecutar comandos SQL de su elección mediante el parámetro cat. NOTA: el origen de esta información es desconocido; los detalles se han obtenido únicamente de información de terceros. • http://secunia.com/advisories/33152 http://www.securityfocus.com/bid/33499 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

ASP-DEv XM Events Diary stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request for diary.mdb. ASP-DEv XM Events Diary almacena información sensible en la raíz web con un control de acceso insuficiente, loq ue permite a atacantes remotos descargar el archivo base de datos mediante una petición directa a diary.mdb. • http://packetstormsecurity.org/0812-exploits/aspdevxmdiary-sqldisclose.txt • CWE-264: Permissions, Privileges, and Access Controls •