In Joomla! before 3.9.14, the lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.
Max CVSS
9.8
EPSS Score
0.20%
Published
2019-12-18
Updated
2019-12-18
In Joomla! before 3.9.14, a missing access check in framework files could lead to a path disclosure.
Max CVSS
5.3
EPSS Score
0.15%
Published
2019-12-18
Updated
2019-12-19
An issue was discovered in Joomla! before 3.9.13. A missing access check in the phputf8 mapping files could lead to a path disclosure.
Max CVSS
5.3
EPSS Score
0.09%
Published
2019-11-06
Updated
2019-11-06
An issue was discovered in Joomla! before 3.9.13. A missing token check in com_template causes a CSRF vulnerability.
Max CVSS
8.8
EPSS Score
0.07%
Published
2019-11-06
Updated
2019-11-06
In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-09-24
Updated
2019-09-25
In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.
Max CVSS
5.3
EPSS Score
0.08%
Published
2019-08-14
Updated
2020-08-24
In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution. This is fixed in 3.9.9.
Max CVSS
8.8
EPSS Score
0.60%
Published
2019-08-05
Updated
2020-08-24
An issue was discovered in Joomla! before 3.9.7. The subform fieldtype does not sufficiently filter or validate input of subfields. This leads to XSS attack vectors.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-06-11
Updated
2023-01-30
An issue was discovered in Joomla! before 3.9.7. The CSV export of com_actionslogs is vulnerable to CSV injection.
Max CVSS
9.8
EPSS Score
1.69%
Published
2019-06-11
Updated
2023-01-30
An issue was discovered in Joomla! before 3.9.7. The update server URL of com_joomlaupdate can be manipulated by non Super-Admin users.
Max CVSS
6.5
EPSS Score
0.05%
Published
2019-06-11
Updated
2023-01-30
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
Max CVSS
9.8
EPSS Score
2.75%
Published
2019-05-09
Updated
2021-10-01
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-05-20
Updated
2019-05-20
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Max CVSS
6.1
EPSS Score
3.63%
Published
2019-04-20
Updated
2024-02-16
An issue was discovered in Joomla! before 3.9.5. The "refresh list of helpsites" endpoint of com_users lacks access checks, allowing calls from unauthenticated users.
Max CVSS
7.5
EPSS Score
0.08%
Published
2019-04-10
Updated
2020-08-24
An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.
Max CVSS
9.8
EPSS Score
91.69%
Published
2019-04-10
Updated
2019-04-17
An issue was discovered in Joomla! before 3.9.4. The media form field lacks escaping, leading to XSS.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-03-12
Updated
2019-03-15
An issue was discovered in Joomla! before 3.9.4. The sample data plugins lack ACL checks, allowing unauthorized access.
Max CVSS
7.5
EPSS Score
0.27%
Published
2019-03-12
Updated
2020-08-24
An issue was discovered in Joomla! before 3.9.4. The JSON handler in com_config lacks input validation, leading to XSS.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-03-12
Updated
2019-03-15
An issue was discovered in Joomla! before 3.9.4. The item_title layout in edit views lacks escaping, leading to XSS.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-03-12
Updated
2019-03-15
An issue was discovered in Joomla! before 3.9.3. Inadequate filtering on URL fields in various core components could lead to an XSS vulnerability.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-02-12
Updated
2019-02-13
An issue was discovered in Joomla! before 3.9.3. The phar:// stream wrapper can be used for objection injection attacks because there is no protection mechanism (such as the TYPO3 PHAR stream wrapper) to prevent use of the phar:// handler for non .phar-files.
Max CVSS
9.8
EPSS Score
0.28%
Published
2019-02-12
Updated
2020-08-24
An issue was discovered in Joomla! before 3.9.3. A combination of specific web server configurations, in connection with specific file types and browser-side MIME-type sniffing, causes an XSS attack vector.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-02-12
Updated
2019-02-13
An issue was discovered in Joomla! before 3.9.3. Inadequate checks at the Global Configuration helpurl settings allowed stored XSS.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-02-12
Updated
2019-02-13
An issue was discovered in Joomla! before 3.9.3. Inadequate parameter handling in JavaScript code (core.js writeDynaList) could lead to an XSS attack vector.
Max CVSS
6.1
EPSS Score
0.10%
Published
2019-02-12
Updated
2019-02-13
An issue was discovered in Joomla! before 3.9.3. The "No Filtering" textfilter overrides child settings in the Global Configuration. This is intended behavior. However, it might be unexpected for the user because the configuration dialog lacks an additional message to explain this.
Max CVSS
6.1
EPSS Score
0.14%
Published
2019-02-12
Updated
2020-08-24
29 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!