Page 82 of 804 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 4

Directory traversal vulnerability in the BeeHeard (com_beeheard) and BeeHeard Lite (com_beeheardlite) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente BeeHeard (com_beeheard) y BeeHeard Lite (com_beeheardlite) v1.0 para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12239 http://packetstormsecurity.org/1004-exploits/joomlabeeheardlite-lfi.txt http://secunia.com/advisories/39475 http://www.exploit-db.com/exploits/12239 http://www.securityfocus.com/bid/39506 https://exchange.xforce.ibmcloud.com/vulnerabilities/57845 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

Directory traversal vulnerability in the iNetLanka Multiple Map (com_multimap) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente iNetLanka Multiple Map (com_multimap) v1.0 para Joomla!, permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12288 http://secunia.com/advisories/39530 http://www.exploit-db.com/exploits/12288 http://www.securityfocus.com/bid/39551 http://www.vupen.com/english/advisories/2010/0927 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 3EXPL: 3

Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente iNetLanka Multiple root (com_multiroot) v1.0 y v1.1 para Joomla! • https://www.exploit-db.com/exploits/12287 http://secunia.com/advisories/39531 http://www.exploit-db.com/exploits/12287 http://www.securityfocus.com/bid/39552 http://www.vupen.com/english/advisories/2010/0928 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Real Estate Property (com_properties) component 3.1.22-03 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Real Estate Property (com_properties) v3.1.22-03 para Joomla! • https://www.exploit-db.com/exploits/11851 http://secunia.com/advisories/39074 http://www.exploit-db.com/exploits/11851 http://www.osvdb.org/63143 http://www.securityfocus.com/bid/38912 https://exchange.xforce.ibmcloud.com/vulnerabilities/57110 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in the OrgChart (com_orgchart) component 1.0.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente OrgChart (com_orgchart) v1.0.0 para Joomla! permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/12317 http://packetstormsecurity.org/1004-exploits/joomlaorgchart-lfi.txt http://www.exploit-db.com/exploits/12317 http://www.securityfocus.com/bid/39606 https://exchange.xforce.ibmcloud.com/vulnerabilities/58031 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •