Page 88 of 804 results (0.007 seconds)

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 3

Directory traversal vulnerability in the Shoutbox Pro (com_shoutbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una vulnerabilidad de salto de directorio en el componente para Joomla! Shoutbox Pro (com_shoutbox) permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/12067 http://osvdb.org/63562 http://secunia.com/advisories/39352 http://www.exploit-db.com/exploits/12067 http://www.securityfocus.com/bid/39213 https://exchange.xforce.ibmcloud.com/vulnerabilities/57534 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in the TRAVELbook (com_travelbook) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente TRAVELbook (com_travelbook) v1.0.1 para Joomla! permite a atacantes remotos leer archivos de su elección y probablemente provocar otros impactos no especificados a través de .. • https://www.exploit-db.com/exploits/12151 http://secunia.com/advisories/39254 http://www.exploit-db.com/exploits/12151 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 4

SQL injection vulnerability in the Freestyle FAQs Lite (com_fsf) component, possibly 1.3, for Joomla! allows remote attackers to execute arbitrary SQL commands via the faqid parameter in an faq action to index.php. Una vulnerabilidad de inyección SQL en el componente para Joomla! Freestyle FAQs Lite (com_fsf) permite a atacantes remotos ejecutar comandos SQL en una accion faq a través del parámetro faqid de index.php. • https://www.exploit-db.com/exploits/12078 http://packetstormsecurity.org/1004-exploits/joomlafreestyle-sql.txt http://secunia.com/advisories/39288 http://www.exploit-db.com/exploits/12078 http://www.securityfocus.com/bid/39220 https://exchange.xforce.ibmcloud.com/vulnerabilities/57588 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 1%CPEs: 14EXPL: 4

Directory traversal vulnerability in the redSHOP (com_redshop) component 1.0.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. Vulnerabilidad de salto de directorio en el componente redSHOP (com_redshop) v1.0.x para Joomla! permite a atacantes remotos leer archivos de su elección a través de .. • https://www.exploit-db.com/exploits/12054 http://packetstormsecurity.org/1004-exploits/joomlaredshop-lfi.txt http://redcomponent.com/redshop/redshop-changelog http://secunia.com/advisories/39343 http://www.exploit-db.com/exploits/12054 http://www.osvdb.org/63535 http://www.securityfocus.com/bid/39206 https://exchange.xforce.ibmcloud.com/vulnerabilities/57512 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

Directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una vulnerabilidad de salto de directorio en el componente para Joomla! TweetLA (com_tweetla) v1.01 permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/12142 http://secunia.com/advisories/39258 http://www.exploit-db.com/exploits/12142 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •