CVE-2010-1746 – Joomla! Component Table JX - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2010-1746
Multiple cross-site scripting (XSS) vulnerabilities in the Table JX (com_grid) component for Joomla! allow remote attackers to inject arbitrary web script or HTML via the (1) data_search and (2) rpp parameters to index.php. Múltiples vulnerabilidades de XSS en el componente Table JX (com_grid) para Joomla! permiten a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a través de los parámetros (1) data_search y (2) rpp en index.php. • https://www.exploit-db.com/exploits/12473 http://www.exploit-db.com/exploits/12473 http://www.securityfocus.com/bid/39854 http://www.vupen.com/english/advisories/2010/1053 https://exchange.xforce.ibmcloud.com/vulnerabilities/58270 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2010-1716 – Joomla! Component Agenda Address Book 1.0.1 - 'id' SQL Injection
https://notcve.org/view.php?id=CVE-2010-1716
SQL injection vulnerability in the Agenda Address Book (com_agenda) component 1.0.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. Vulnerabilidad de inyección SQL en el componente Agenda Address Book (com_agenda) v1.0.1 para Joomla!, permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro "id" en una acción de detalle a index.php. • https://www.exploit-db.com/exploits/12132 http://secunia.com/advisories/39238 http://www.exploit-db.com/exploits/12132 http://www.joomlanetprojects.com/index.php/en/joomla-projects-downloads/joomla-1/joomla-1/42-comagenda.html http://www.osvdb.org/63723 http://www.securityfocus.com/bid/39380 https://exchange.xforce.ibmcloud.com/vulnerabilities/57770 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2010-1715 – Joomla! Component Online Exam 1.5.0 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1715
Directory traversal vulnerability in the Online Examination (aka Online Exam or com_onlineexam) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Online Examination (también conocido como Online Exam o com_onlineexam) v1.5.0 para Joomla! • https://www.exploit-db.com/exploits/12174 http://packetstormsecurity.org/1004-exploits/joomlaonlineexam-lfi.txt http://secunia.com/advisories/39414 http://www.exploit-db.com/exploits/12174 http://www.osvdb.org/63659 https://exchange.xforce.ibmcloud.com/vulnerabilities/57677 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1718 – Joomla! Component Archery Scores 1.0.6 - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1718
Directory traversal vulnerability in archeryscores.php in the Archery Scores (com_archeryscores) component 1.0.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en archeryscores.php del componente Archery Scores (com_archeryscores) v1.0.6 para Joomla!, permite a atacantes remotos incluir y ejecutar ficheros locales de su elección al utilizar caracteres .. • https://www.exploit-db.com/exploits/12282 http://secunia.com/advisories/39521 http://www.exploit-db.com/exploits/12282 http://www.securityfocus.com/bid/39545 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2010-1722 – Joomla! Component Online Market 2.x - Local File Inclusion
https://notcve.org/view.php?id=CVE-2010-1722
Directory traversal vulnerability in the Online Market (com_market) component 2.x for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Online Market (com_market) v2.x para Joomla!, permite a atacantes remotos leer archivos a su elección y posiblemente tener otro impacto no especificado a través de .. • https://www.exploit-db.com/exploits/12177 http://packetstormsecurity.org/1004-exploits/joomlaonlinemarket-lfi.txt http://secunia.com/advisories/39409 http://www.exploit-db.com/exploits/12177 http://www.osvdb.org/63671 https://exchange.xforce.ibmcloud.com/vulnerabilities/57674 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •