7.6 High
AI Score
Confidence
High
0.081 Low
EPSS
Percentile
94.4%
PHP remote file inclusion vulnerability in server.php in the Hashcash Component (com_hashcash) 1.2.1 for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
advisories.echo.or.id/adv/adv38-matdhule-2006.txt
archives.neohapsis.com/archives/bugtraq/2006-07/0180.html
secunia.com/advisories/21053
securityreason.com/securityalert/1249
www.vupen.com/english/advisories/2006/2802
exchange.xforce.ibmcloud.com/vulnerabilities/27720
www.exploit-db.com/exploits/2026