Page 80 of 804 results (0.006 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 4

Directory traversal vulnerability in joomlaflickr.php in the Joomla Flickr (com_joomlaflickr) component 1.0.3 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en joomlaflickr.php en el componente Joomla Flickr v1.0.3 (com_joomlaflickr) para Joomla!, permite a atacantes remotos incluir y ejecutar archivos locales de su elección a través de .. • https://www.exploit-db.com/exploits/12085 http://bitbucket.org/roberto.aloi/joomla-flickr/changeset/64ebf6b25030 http://packetstormsecurity.org/1004-exploits/joomlaflickr-lfi.txt http://secunia.com/advisories/39358 http://www.exploit-db.com/exploits/12085 http://www.securityfocus.com/bid/39251 https://exchange.xforce.ibmcloud.com/vulnerabilities/57573 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 5

Directory traversal vulnerability in the redTWITTER (com_redtwitter) component 1.0.x including 1.0b11 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente redTWITTER (com_redtwitter) v1.0.x incluido v1.0b.11 de Joomla! • https://www.exploit-db.com/exploits/12055 http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html http://osvdb.org/63533 http://packetstormsecurity.org/1004-exploits/joomlaredtwitter-lfi.txt http://secunia.com/advisories/39342 http://www.exploit-db.com/exploits/12055 http://www.securityfocus.com/bid/39211 https://exchange.xforce.ibmcloud.com/vulnerabilities/57511 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente J! • https://www.exploit-db.com/exploits/12083 http://secunia.com/advisories/39356 http://www.exploit-db.com/exploits/12083 http://www.securityfocus.com/bid/39243 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Affiliate Datafeeds (com_datafeeds) component build 880 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Affiliate Datafeeds build 880 (com_datafeeds) para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12088 http://secunia.com/advisories/39360 http://www.exploit-db.com/exploits/12088 http://www.securityfocus.com/bid/39246 https://exchange.xforce.ibmcloud.com/vulnerabilities/57570 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the JA Voice (com_javoice) component 2.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. Vulnerabilidad de salto de directorio en el componente JA Voice v2.0 (com_javoice) de Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12121 http://packetstormsecurity.org/1004-exploits/joomlajavoice-lfi.txt http://secunia.com/advisories/39202 http://www.exploit-db.com/exploits/12121 http://www.securityfocus.com/bid/39343 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •