Possible XSS atack vector through SVG embedding in com_media.Īn issue was discovered in Joomla! 4.0.0 through 4.1.0. Information disclosure Access to private information and components, possibility to view other users' information.Īn issue was discovered in Joomla! 4.0.0 through 4.1.0. The component is: Access to private information and components, possibility to view other users' information. The impact is: obtain sensitive information (remote). Joomla Guru extension 5.2.5 is affected by: Insecure Permissions. In Joomla component 'jDownloads 3.9.8.2 Stable' the remote user can change some parameters in the address bar and see the names of other users' files In Joomla component 'Joomlatools - DOCman 3.5.13 (and likely most versions below)' are affected to an reflected Cross-Site Scripting (XSS) in an image upload function Multiple Full Path Disclosures because of missing '_JEXEC or die check' caused by the PSR12 changes. Sites with publicly enabled debug mode exposed data of previous requests.Īn issue was discovered in Joomla! 4.2.0. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in various components.Īn issue was discovered in Joomla! 4.0.0 through 4.2.3. Inadequate filtering of potentially malicious user input leads to reflected XSS vulnerabilities in com_media.Īn issue was discovered in Joomla! 4.2.0 through 4.2.3. A missing token check causes a CSRF vulnerability in the handling of post-installation messages.Īn issue was discovered in Joomla! 4.0.0 through 4.2.4. A missing ACL check allows non super-admin users to access com_actionlogs.Īn issue was discovered in Joomla! 4.0.0 through 4.2.6. An improper access check allows unauthorized access to webservice endpoints.Īn issue was discovered in Joomla! 4.0.0 through 4.2.4. An attacker can interact with the database and could be able to read, modify and delete data on it.Īn issue was discovered in Joomla! 4.0.0 through 4.2.7. The 'Visforms Base Package for Joomla 3' extension is vulnerable to SQL Injection as concatenation is used to construct an SQL Query. This issue affects AnyMailing Joomla Plugin Enterprise in versions below 8.3.0. This issue affects AnyMailing Joomla Plugin in versions below 8.3.0.ĪnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office. AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office.
0 Comments
Leave a Reply. |