Page 98 of 804 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in the jEmbed-Embed Anything (com_jembed) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a summary action to index.php. Vulnerabilidad de inyección SQL en el componente jEmbed-Embed Anything (com_jembed)para Joomla! permite a atacantes remotos ejecutar comandos SQL de forma arbitraria a través del parámetro "catid" en una acción "summary" a index.php. • https://www.exploit-db.com/exploits/11026 http://osvdb.org/61510 http://secunia.com/advisories/38112 http://www.exploit-db.com/exploits/11026 http://www.vupen.com/english/advisories/2010/0047 https://exchange.xforce.ibmcloud.com/vulnerabilities/55443 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.8EPSS: 6%CPEs: 19EXPL: 4

Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente RokDownloads (com_rokdownloads) anterior v1.0.1 para Joomla! permite a atacantes remotos incluir o ejecutar archivos locales de su elección a través del caracer .. • https://www.exploit-db.com/exploits/11760 http://osvdb.org/62972 http://packetstormsecurity.org/1003-exploits/joomlarokdownloads-lfi.txt http://secunia.com/advisories/38982 http://www.exploit-db.com/exploits/11760 http://www.rockettheme.com/extensions-updates/638-rokdownloads-10-released http://www.securityfocus.com/bid/38741 https://exchange.xforce.ibmcloud.com/vulnerabilities/56898 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

SQL injection vulnerability in the Productbook (com_productbook) component 1.0.4 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a detail action to index.php. NOTE: some of these details are obtained from third party information. Múltiples vulnerabilidades de inyección SQL en el componente Productbook (com_productbook) v1.0.4 for Joomla! permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro id en una acción detail sobre index.php. • https://www.exploit-db.com/exploits/11352 http://secunia.com/advisories/38466 http://www.exploit-db.com/exploits/11352 http://www.vupen.com/english/advisories/2010/0322 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 3

Directory traversal vulnerability in the CARTwebERP (com_cartweberp) component 1.56.75 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. Vulnerabilidad de salto de directorio en el componente CARTwebERP (com_cartweberp)v1.56.75 para Joomla! permite a atacantes remotos leer archivos de su elección al utilizar caracteres .. • https://www.exploit-db.com/exploits/10942 http://osvdb.org/61447 http://packetstormsecurity.org/1001-exploits/joomlacartweberp-lfi.txt http://secunia.com/advisories/37917 http://www.securityfocus.com/bid/37581 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 4

Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information. Vulnerabilidad de salto de directorio en el componente Abbreviations Manager (com_abbrev) v1.1 para Joomla! • https://www.exploit-db.com/exploits/10948 http://osvdb.org/61458 http://secunia.com/advisories/37834 http://www.exploit-db.com/exploits/10948 http://www.securityfocus.com/bid/37560 https://exchange.xforce.ibmcloud.com/vulnerabilities/55348 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •