Page 87 of 804 results (0.004 seconds)

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 3

Directory traversal vulnerability in wmi.php in the Webmoney Web Merchant Interface (aka WMI or com_wmi) component 1.5.0 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en wmi.php en el componente Webmoney Web Merchant Interface (alias WMI o com_wmi) v1.5.0 para Joomla! permite a atacantes remotos incluir y ejecutar archivos locales a través de un .. • https://www.exploit-db.com/exploits/12316 http://osvdb.org/63979 http://secunia.com/advisories/39539 http://www.exploit-db.com/exploits/12316 http://www.securityfocus.com/bid/39608 https://exchange.xforce.ibmcloud.com/vulnerabilities/58032 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

SQL injection vulnerability in the Media Mall Factory (com_mediamall) component 1.0.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the category parameter to index.php. Vulnerabilidad de inyección SQL en el componente Media Mall Factory (com_mediamall) v1.0.4 para Joomla! permite a atacantes remotos ejecutar comandos SQL a través del parámetro category a index.php. • https://www.exploit-db.com/exploits/12234 http://secunia.com/advisories/39546 http://www.exploit-db.com/exploits/12234 http://www.osvdb.org/63940 http://www.packetstormsecurity.com/1004-exploits/joomlamediamallfactory-bsql.txt http://www.securityfocus.com/bid/39488 http://www.thefactory.ro/shop/joomla-components/media-mall.html https://exchange.xforce.ibmcloud.com/vulnerabilities/57906 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

SQL injection vulnerability in the SermonSpeaker (com_sermonspeaker) component before 3.2.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a speakerpopup action to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de inyección SQL en el componente SermonSpeaker (com_sermonspeaker) anterior v3.2.1 para Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id en una acci´no speakerpopup en index.php. • https://www.exploit-db.com/exploits/12184 http://joomlacode.org/gf/project/sermon_speaker/forum/?action=ForumBrowse&forum_id=7897&_forum_action=ForumMessageBrowse&thread_id=15219 http://joomlacode.org/gf/project/sermon_speaker/news/?action=NewsThreadView&id=2549 http://secunia.com/advisories/39385 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 3

Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en ndex.php en el componente MyBlog (com_myblog) v3.0.329 para Joomla! • https://www.exploit-db.com/exploits/11625 http://secunia.com/advisories/38777 http://www.exploit-db.com/exploits/11625 http://www.securityfocus.com/bid/38530 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the givesight PowerMail Pro (com_powermail) component 1.5.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente givesight PowerMail Pro (com_powermail) v1.5.3 para Joomla! permite a atacantes remotos leer ficheros de su elección y posiblemente, tener otro impacto a través de un .. • https://www.exploit-db.com/exploits/12118 http://packetstormsecurity.org/1004-exploits/joomlapowermail-lfi.txt http://secunia.com/advisories/39226 http://www.exploit-db.com/exploits/12118 http://www.securityfocus.com/bid/39348 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •