CVE-2010-1950 – Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection
https://notcve.org/view.php?id=CVE-2010-1950
SQL injection vulnerability in the Online News Paper Manager (com_jnewspaper) component 1.0 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the date_info parameter to index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de inyección SQL en el componente Online News Paper Manager (com_jnewspaper) v1.0 para Joomla!, cuando magic_quotes_gpc está deshabilitado, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro date_info de index.php. • https://www.exploit-db.com/exploits/12305 http://secunia.com/advisories/39536 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2010-1955 – Joomla! Component Deluxe Blog Factory 1.1.2 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1955
Directory traversal vulnerability in the Deluxe Blog Factory (com_blogfactory) component 1.1.2 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Deluxe Blog Factory (com_blogfactory) v1.1,2 para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12238 http://osvdb.org/63801 http://packetstormsecurity.org/1004-exploits/joomladeluxeblog-lfi.txt http://secunia.com/advisories/39473 http://www.exploit-db.com/exploits/12238 http://www.securityfocus.com/bid/39508 https://exchange.xforce.ibmcloud.com/vulnerabilities/57846 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1949 – Joomla! Component Online News Paper Manager 1.0 - 'cid' SQL Injection
https://notcve.org/view.php?id=CVE-2010-1949
SQL injection vulnerability in the Online News Paper Manager (com_jnewspaper) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección SQL en el componente Online News Paper Manager (com_jnewspaper) v1.0 para Joomla!, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "cid" de index.php. • https://www.exploit-db.com/exploits/12305 http://secunia.com/advisories/39536 http://www.exploit-db.com/exploits/12305 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2010-1957 – Joomla! Component Love Factory 1.3.4 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1957
Directory traversal vulnerability in the Love Factory (com_lovefactory) component 1.3.4 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Love Factory v1.3.4 para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12235 http://osvdb.org/63803 http://packetstormsecurity.org/1004-exploits/joomlalovefactory-lfi.txt http://secunia.com/advisories/39471 http://www.exploit-db.com/exploits/12235 http://www.securityfocus.com/bid/39512 https://exchange.xforce.ibmcloud.com/vulnerabilities/57849 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1956 – Joomla! Component Gadget Factory 1.0.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1956
Directory traversal vulnerability in the Gadget Factory (com_gadgetfactory) component 1.0.0 and 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Gadget Factory (com_gadgetfactory) v1.0.0 y v1.5.0 para Joomla! • https://www.exploit-db.com/exploits/12285 http://osvdb.org/63917 http://packetstormsecurity.org/1004-exploits/joomlagadgetfactory-lfi.txt http://secunia.com/advisories/39522 http://www.exploit-db.com/exploits/12285 http://www.securityfocus.com/bid/39547 http://www.thefactory.ro/all-thefactory-products/gadget-factory-for-joomla-1.5.x/detailed-product-flyer.html http://www.vupen.com/english/advisories/2010/0930 https://exchange.xforce.ibmcloud.com/vulnerabilities/57895 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •