Lucene search

K

Com Extensions Security Vulnerabilities

cve
cve

CVE-2010-4720

SQL injection vulnerability in the JExtensions JE Auto (com_jeauto) component before 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to the view item...

8.6AI Score

0.002EPSS

2022-10-03 04:21 PM
19
cve
cve

CVE-2010-1480

SQL injection vulnerability in the RokModule (com_rokmodule) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the module parameter to index.php. NOTE: some of these details are obtained from third party...

8.7AI Score

0.002EPSS

2022-10-03 04:20 PM
21
cve
cve

CVE-2012-4071

Cross-site scripting (XSS) vulnerability in the comments module in the RSGallery2 (com_rsgallery2) component before 2.3.0 for Joomla! 1.5.x, and before 3.2.0 for Joomla! 2.5.x, allows remote attackers to inject arbitrary web script or HTML via crafted BBCode markup in a...

5.9AI Score

0.002EPSS

2022-10-03 04:15 PM
21
cve
cve

CVE-2012-4235

The RSGallery2 (com_rsgallery2) component before 3.2.0 for Joomla! 2.5.x does not place index.html files in image directories, which allows remote attackers to list image filenames via a request for a directory...

6.8AI Score

0.003EPSS

2022-10-03 04:15 PM
18
cve
cve

CVE-2012-3554

SQL injection vulnerability in the RSGallery2 (com_rsgallery2) component before 2.3.0 for Joomla! 1.5.x, and before 3.2.0 for Joomla! 2.5.x, allows remote attackers to execute arbitrary SQL commands via unspecified...

8.7AI Score

0.002EPSS

2022-10-03 04:15 PM
20
cve
cve

CVE-2011-5134

Unrestricted file upload vulnerability in editor/extensions/browser/file.php in the JCE component before 2.0.18 for Joomla! allows remote authenticated users with the author privileges to execute arbitrary PHP code by uploading a file with a double extension, as demonstrated by .php.gif. NOTE:...

7.5AI Score

0.004EPSS

2022-10-03 04:15 PM
20
cve
cve

CVE-2014-0794

SQL injection vulnerability in the JV Comment (com_jvcomment) component before 3.0.3 for Joomla! allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a comment.like action to...

8AI Score

0.007EPSS

2014-01-26 08:55 PM
31
cve
cve

CVE-2010-2122

Directory traversal vulnerability in the SimpleDownload (com_simpledownload) component before 0.9.6 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to...

6AI Score

0.018EPSS

2010-06-01 09:30 PM
30
cve
cve

CVE-2010-1479

SQL injection vulnerability in the RokModule (com_rokmodule) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the moduleid parameter in a raw action to...

8.6AI Score

0.003EPSS

2010-04-19 07:30 PM
24
cve
cve

CVE-2010-1305

Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to...

5.7AI Score

0.032EPSS

2010-04-08 04:30 PM
28
cve
cve

CVE-2010-1056

Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to...

6AI Score

0.065EPSS

2010-03-23 05:30 PM
32
cve
cve

CVE-2009-4628

SQL injection vulnerability in the TemplatePlaza.com TPDugg (com_tpdugg) component 1.1 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a tags action to...

8.7AI Score

0.004EPSS

2010-01-18 08:30 PM
23
cve
cve

CVE-2009-3334

SQL injection vulnerability in the Lhacky! Extensions Cave Joomla! Integrated Newsletters Component (aka JINC or com_jinc) component 0.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the newsid parameter in a messages action to...

8.4AI Score

0.001EPSS

2009-09-23 12:08 PM
33
cve
cve

CVE-2007-1382

The PHP COM extensions for PHP on Windows systems allow context-dependent attackers to execute arbitrary code via a WScript.Shell COM object, as demonstrated by using the Run method of this object to execute cmd.exe, which bypasses PHP's safe...

7.6AI Score

0.0004EPSS

2007-03-10 12:19 AM
25