Page 95 of 804 results (0.002 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Cookex Agency CKForms (com_ckforms) component 1.3.3 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una vulnerabilidad de salto de directorio en el componente Cookex Agency CKForms(com_ckforms) v1.3.3 para Joomla! permite a atacantes remotos leer ficheros arbitrarios a través de un .. • https://www.exploit-db.com/exploits/11785 https://www.exploit-db.com/exploits/15453 http://packetstormsecurity.org/1003-exploits/joomlackforms-lfisql.txt http://secunia.com/advisories/38976 http://www.exploit-db.com/exploits/11785 http://www.osvdb.org/63031 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 4

Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Una Vulnerabilidad del salto del directorio en el componente iJoomla News Portal (com_news_portal) versión 1.5.x para Joomla! permite a los atacantes remotos leer archivos arbitrarios por medio de un .. • https://www.exploit-db.com/exploits/12077 http://osvdb.org/63572 http://packetstormsecurity.org/1004-exploits/joomlanewportal-lfi.txt http://secunia.com/advisories/39289 http://www.exploit-db.com/exploits/12077 http://www.securityfocus.com/bid/39222 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 3

Directory traversal vulnerability in the Seber Cart (com_sebercart) component 1.0.0.12 and 1.0.0.13 for Joomla!, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Seber Cart (com_sebercart) v1.0.0.12 y v1.0.0.13 para Joomla! • https://www.exploit-db.com/exploits/12082 http://secunia.com/advisories/39355 http://www.exploit-db.com/exploits/12082 http://www.securityfocus.com/bid/39237 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 4

Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Highslide JS v1.5 y v2.0.9 para Joomla! • https://www.exploit-db.com/exploits/12086 http://packetstormsecurity.org/1004-exploits/joomlahsconfig-lfi.txt http://secunia.com/advisories/39359 http://www.exploit-db.com/exploits/12086 http://www.securityfocus.com/bid/39239 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 3

Directory traversal vulnerability in weberpcustomer.php in the webERPcustomer (com_weberpcustomer) component 1.2.1 and 1.x before 1.06.02 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en weberpcustomer.php en el componente webERPcustomer v1.2.1 y 1.x anterior a v1.06.02 para Joomla! • https://www.exploit-db.com/exploits/11999 http://packetstormsecurity.org/1004-exploits/joomlaweberpcustomer-lfi.txt http://secunia.com/advisories/39209 http://www.exploit-db.com/exploits/11999 https://exchange.xforce.ibmcloud.com/vulnerabilities/57482 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •