Lucene search

K

24 matches found

CVE
CVE
added 2018/05/22 3:29 p.m.86 views

CVE-2018-11321

An issue was discovered in com_fields in Joomla! Core before 3.8.8. Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.

6.5CVSS6.6AI score0.00223EPSS
CVE
CVE
added 2018/06/26 7:29 p.m.81 views

CVE-2018-12712

An issue was discovered in Joomla! 2.5.0 through 3.8.8 before 3.8.9. The autoload code checks classnames to be valid, using the "class_exists" function in PHP. In PHP 5.3, this function validates invalid names as valid, which can result in a Local File Inclusion.

8.8CVSS8.6AI score0.01882EPSS
CVE
CVE
added 2018/10/09 9:29 p.m.81 views

CVE-2018-17856

An issue was discovered in Joomla! before 3.8.13. com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled the ability of Administrator-level users to access com_joomlaupdate and trigger code execution.

7.2CVSS7.3AI score0.06046EPSS
CVE
CVE
added 2018/03/15 1:29 a.m.81 views

CVE-2018-8045

In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User Notes list view.

8.8CVSS8.8AI score0.66389EPSS
CVE
CVE
added 2018/10/09 9:29 p.m.72 views

CVE-2018-17855

An issue was discovered in Joomla! before 3.8.13. If an attacker gets access to the mail account of an user who can approve admin verifications in the registration process, he can activate himself.

8.8CVSS8.5AI score0.00485EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.68 views

CVE-2018-11325

An issue was discovered in Joomla! Core before 3.8.8. The web install application would autofill password fields after either a form validation error or navigating to a previous install step, and display the plaintext password for the administrator account at the confirmation screen.

9.8CVSS9.4AI score0.00114EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.68 views

CVE-2018-11328

An issue was discovered in Joomla! Core before 3.8.8. Under specific circumstances (a redirect issued with a URI containing a username and password when the Location: header cannot be used), a lack of escaping the user-info component of the URI could result in an XSS vulnerability.

4.7CVSS4.9AI score0.00058EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.66 views

CVE-2018-11323

An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to modify the access levels of user groups with higher permissions.

8.8CVSS8.5AI score0.0062EPSS
CVE
CVE
added 2018/06/26 7:29 p.m.64 views

CVE-2018-12711

An XSS issue was discovered in the language switcher module in Joomla! 1.6.0 through 3.8.8 before 3.8.9. In some cases, the link of the current language might contain unescaped HTML special characters. This may lead to reflective XSS via injection of arbitrary parameters and/or values on the curren...

6.1CVSS6AI score0.01238EPSS
CVE
CVE
added 2018/01/30 5:29 p.m.63 views

CVE-2018-6377

In Joomla! before 3.8.4, inadequate input filtering in com_fields leads to an XSS vulnerability in multiple field types, i.e., list, radio, and checkbox

6.1CVSS6AI score0.46615EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.62 views

CVE-2018-11322

An issue was discovered in Joomla! Core before 3.8.8. Depending on the server configuration, PHAR files might be handled as executable PHP scripts by the webserver.

7.5CVSS7.6AI score0.00219EPSS
CVE
CVE
added 2018/10/09 9:29 p.m.62 views

CVE-2018-17857

An issue was discovered in Joomla! before 3.8.13. Inadequate checks on the tags search fields can lead to an access level violation.

4.3CVSS4.8AI score0.00063EPSS
CVE
CVE
added 2018/08/29 3:29 a.m.61 views

CVE-2018-15882

An issue was discovered in Joomla! before 3.8.12. Inadequate checks in the InputFilter class could allow specifically prepared phar files to pass the upload filter.

9.8CVSS9.2AI score0.01174EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.61 views

CVE-2018-6378

In Joomla! Core before 3.8.8, inadequate filtering of file and folder names leads to various XSS attack vectors in the media manager.

6.1CVSS6AI score0.01889EPSS
CVE
CVE
added 2018/01/30 5:29 p.m.60 views

CVE-2018-6380

In Joomla! before 3.8.4, lack of escaping in the module chromes leads to XSS vulnerabilities in the module system.

6.1CVSS6.2AI score0.0312EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.58 views

CVE-2018-11326

An issue was discovered in Joomla! Core before 3.8.8. Inadequate input filtering leads to a multiple XSS vulnerabilities. Additionally, the default filtering settings could potentially allow users of the default Administrator user group to perform a XSS attack.

4.8CVSS5.1AI score0.00066EPSS
CVE
CVE
added 2018/01/30 5:29 p.m.58 views

CVE-2018-6376

In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.

9.8CVSS9.6AI score0.07734EPSS
CVE
CVE
added 2018/08/29 3:29 a.m.57 views

CVE-2018-15881

An issue was discovered in Joomla! before 3.8.12. Inadequate checks regarding disabled fields can lead to an ACL violation.

7.5CVSS7.4AI score0.00218EPSS
CVE
CVE
added 2018/10/09 9:29 p.m.55 views

CVE-2018-17858

An issue was discovered in Joomla! before 3.8.13. com_installer actions do not have sufficient CSRF hardening in the backend.

8.8CVSS8.6AI score0.00174EPSS
CVE
CVE
added 2018/08/29 3:29 a.m.54 views

CVE-2018-15880

An issue was discovered in Joomla! before 3.8.12. Inadequate output filtering on the user profile page could lead to a stored XSS attack.

5.4CVSS6.8AI score0.00171EPSS
CVE
CVE
added 2018/10/09 9:29 p.m.54 views

CVE-2018-17859

An issue was discovered in Joomla! before 3.8.13. Inadequate checks in com_contact could allow mail submission in disabled forms.

4.3CVSS4.9AI score0.00075EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.53 views

CVE-2018-11327

An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission.

4.3CVSS4.8AI score0.00015EPSS
CVE
CVE
added 2018/01/30 5:29 p.m.53 views

CVE-2018-6379

In Joomla! before 3.8.4, inadequate input filtering in the Uri class (formerly JUri) leads to an XSS vulnerability.

6.1CVSS5.9AI score0.0312EPSS
CVE
CVE
added 2018/05/22 3:29 p.m.49 views

CVE-2018-11324

An issue was discovered in Joomla! Core before 3.8.8. A long running background process, such as remote checks for core or extension updates, could create a race condition where a session that was expected to be destroyed would be recreated.

5.9CVSS5.9AI score0.00034EPSS