Page 91 of 804 results (0.008 seconds)

CVSS: 6.8EPSS: 3%CPEs: 2EXPL: 4

Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php. Vulnerabilidad de salto de directorio en el componente AlphaUserPoints (com_alphauserpoints) v1.5.5 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente tener otros impactos al utilizar caracteres ".." • https://www.exploit-db.com/exploits/12150 http://packetstormsecurity.org/1004-exploits/joomlaalphauserpoints-lfi.txt http://secunia.com/advisories/39250 http://www.alphaplug.com http://www.exploit-db.com/exploits/12150 http://www.securityfocus.com/bid/39393 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Advertising (com_advertising) 0.25 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección y posiblemente otros efectos sin determinar al utilizar caracteres .. • https://www.exploit-db.com/exploits/12171 http://packetstormsecurity.org/1004-exploits/joomlaeasyadbanner-lfi.txt http://secunia.com/advisories/39410 http://www.exploit-db.com/exploits/12171 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Ternaria Informatica Jfeedback! (com_jfeedback) component 1.2 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Ternaria Informatica Jfeedback! • https://www.exploit-db.com/exploits/12145 http://packetstormsecurity.org/1004-exploits/joomlajfeedback-lfi.txt http://secunia.com/advisories/39262 http://www.exploit-db.com/exploits/12145 http://www.securityfocus.com/bid/39390 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

Directory traversal vulnerability in the Daily Horoscope (com_horoscope) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente Daily Horoscope (com_horoscope) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12167 http://packetstormsecurity.org/1004-exploits/joomlahoroscope-lfi.txt http://secunia.com/advisories/39406 http://www.exploit-db.com/exploits/12167 http://www.vupen.com/english/advisories/2010/0859 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 5%CPEs: 2EXPL: 3

Directory traversal vulnerability in the AddressBook (com_addressbook) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente AddressBook (com_addressbook) component 1.5.0 para Joomla!, permite a atacantes remotos leer ficheros locales de su elección a través de los caracteres ".." • https://www.exploit-db.com/exploits/12170 http://packetstormsecurity.org/1004-exploits/joomlaaddressbook-lfi.txt http://secunia.com/advisories/39412 http://www.exploit-db.com/exploits/12170 http://www.vupen.com/english/advisories/2010/0862 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •