Joomla

Joomla!

139 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.04%
  • Veröffentlicht 24.09.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:04

In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.

  • EPSS 0.02%
  • Veröffentlicht 14.08.2019 04:15:11
  • Zuletzt bearbeitet 21.11.2024 04:27:54

In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.

  • EPSS 0.45%
  • Veröffentlicht 05.08.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:27:05

In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution...

  • EPSS 0.02%
  • Veröffentlicht 11.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:31

An issue was discovered in Joomla! before 3.9.7. The update server URL of com_joomlaupdate can be manipulated by non Super-Admin users.

  • EPSS 30.93%
  • Veröffentlicht 11.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:31

An issue was discovered in Joomla! before 3.9.7. The CSV export of com_actionslogs is vulnerable to CSV injection.

  • EPSS 0.06%
  • Veröffentlicht 11.06.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:23:32

An issue was discovered in Joomla! before 3.9.7. The subform fieldtype does not sufficiently filter or validate input of subfields. This leads to XSS attack vectors.

  • EPSS 0.24%
  • Veröffentlicht 20.05.2019 13:29:04
  • Zuletzt bearbeitet 21.11.2024 04:21:48

An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.

  • EPSS 9.52%
  • Veröffentlicht 09.05.2019 04:29:01
  • Zuletzt bearbeitet 21.11.2024 04:21:50

The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/b...

Exploit
  • EPSS 0.94%
  • Veröffentlicht 20.04.2019 00:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:56

jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the n...

Exploit
  • EPSS 84.52%
  • Veröffentlicht 10.04.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:12

An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.