Product:

Joomla\!

(Joomla)
Repositories https://github.com/joomla/joomla-cms
#Vulnerabilities 259
Date Id Summary Products Score Patch Annotated
2017-04-25 CVE-2017-7988 In Joomla! 1.6.0 through 3.6.5 (fixed in 3.7.0), inadequate filtering of form contents allows overwriting the author of an article. Joomla\! 5.3
2017-09-20 CVE-2017-14595 In Joomla! before 3.8.0, a logic bug in a SQL query could lead to the disclosure of article intro texts when these articles are in the archived state. Joomla\! 3.7
2019-09-24 CVE-2019-16725 In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates. Joomla\! N/A
2019-08-14 CVE-2019-15028 In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms. Joomla\! 5.3
2019-08-05 CVE-2019-14654 In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution. This is fixed in 3.9.9. Joomla\! 8.8
2019-05-20 CVE-2019-11809 An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector. Joomla\! 6.1
2019-03-12 CVE-2019-9714 An issue was discovered in Joomla! before 3.9.4. The media form field lacks escaping, leading to XSS. Joomla\! 6.1
2019-03-12 CVE-2019-9713 An issue was discovered in Joomla! before 3.9.4. The sample data plugins lack ACL checks, allowing unauthorized access. Joomla\! 7.5
2019-03-12 CVE-2019-9712 An issue was discovered in Joomla! before 3.9.4. The JSON handler in com_config lacks input validation, leading to XSS. Joomla\! 6.1
2019-03-12 CVE-2019-9711 An issue was discovered in Joomla! before 3.9.4. The item_title layout in edit views lacks escaping, leading to XSS. Joomla\! 6.1