Page 86 of 804 results (0.004 seconds)

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 4

Directory traversal vulnerability in graphics.php in the Graphics (com_graphics) component 1.0.6 and 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Una vulnerabilidad de salto de directorio en graphics.php del componente de Joomla! • https://www.exploit-db.com/exploits/12430 http://packetstormsecurity.org/1004-exploits/joomlagraphics-lfi.txt http://secunia.com/advisories/39585 http://www.exploit-db.com/exploits/12430 http://www.securityfocus.com/bid/39743 http://www.vupen.com/english/advisories/2010/1004 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Ultimate Portfolio (com_ultimateportfolio) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una vulnerabilidad de salto de directorio en el componente para Joomla! Ultimate Portfolio (com_ultimateportfolio) v1.0 permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/12426 http://packetstormsecurity.org/1004-exploits/joomlaultimateportfolio-lfi.txt http://www.exploit-db.com/exploits/12426 http://www.securityfocus.com/bid/39739 http://www.vupen.com/english/advisories/2010/1008 https://exchange.xforce.ibmcloud.com/vulnerabilities/58177 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 4

Directory traversal vulnerability in the JA Comment (com_jacomment) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. Vulnerabilidad de salto de directorio en el componente JA (com_jacomment) para Joomla! permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/12236 http://packetstormsecurity.org/1004-exploits/joomlajacomment-lfi.txt http://secunia.com/advisories/39472 http://www.exploit-db.com/exploits/12236 http://www.osvdb.org/63802 http://www.securityfocus.com/bid/39516 https://exchange.xforce.ibmcloud.com/vulnerabilities/57848 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 4

Directory traversal vulnerability in the ZiMB Comment (com_zimbcomment) component 0.8.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente ZiMB (com_zimbcomment) v0.8.1 para Joomla! permite a atacantes remotos leer ficheros a su elección y posiblemente tener otro impacto no especificado a través de un .. • https://www.exploit-db.com/exploits/12283 http://packetstormsecurity.org/1004-exploits/joomlazimbcomment-lfi.txt http://www.exploit-db.com/exploits/12283 http://www.securityfocus.com/bid/39548 http://www.vupen.com/english/advisories/2010/0932 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 4

Directory traversal vulnerability in the ZiMB Core (aka ZiMBCore or com_zimbcore) component 0.1 in the ZiMB Manager collection for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente ZiMB Core (alias ZiMBCore o com_zimbcore) v0.1 en ZiMB Manager collection para Joomla! permite a atacantes remotos leer ficheros a su elección y posiblemente tener otro impacto no especificado a través de un .. • https://www.exploit-db.com/exploits/12284 http://packetstormsecurity.org/1004-exploits/joomlazimbmanager-lfi.txt http://www.exploit-db.com/exploits/12284 http://www.securityfocus.com/bid/39546 http://www.vupen.com/english/advisories/2010/0931 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •