Vulnerabilities
Vulnerable Software
Joomla:  >> Joomla!  >> 3.1.3  Security Vulnerabilities
In Joomla! before 3.9.14, the lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.
CVSS Score
9.8
EPSS Score
0.001
Published
2019-12-18
In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
CVSS Score
6.1
EPSS Score
0.04
Published
2019-09-24
In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.
CVSS Score
5.3
EPSS Score
0.0
Published
2019-08-14
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-05-20
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVSS Score
6.1
EPSS Score
0.013
Published
2019-04-20
An issue was discovered in Joomla! before 3.9.5. The Media Manager component does not properly sanitize the folder parameter, allowing attackers to act outside the media manager root directory.
CVSS Score
9.8
EPSS Score
0.832
Published
2019-04-10
An issue was discovered in Joomla! before 3.9.4. The item_title layout in edit views lacks escaping, leading to XSS.
CVSS Score
6.1
EPSS Score
0.004
Published
2019-03-12
An issue was discovered in Joomla! before 3.9.4. The media form field lacks escaping, leading to XSS.
CVSS Score
6.1
EPSS Score
0.004
Published
2019-03-12
An issue was discovered in Joomla! before 3.9.3. The "No Filtering" textfilter overrides child settings in the Global Configuration. This is intended behavior. However, it might be unexpected for the user because the configuration dialog lacks an additional message to explain this.
CVSS Score
6.1
EPSS Score
0.001
Published
2019-02-12
An issue was discovered in Joomla! before 3.9.3. Inadequate parameter handling in JavaScript code (core.js writeDynaList) could lead to an XSS attack vector.
CVSS Score
6.1
EPSS Score
0.001
Published
2019-02-12


Contact Us

Shodan ® - All rights reserved