Vulnerabilities (CVE)

Filtered by vendor Joomla Subscribe
Total 920 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-15695 1 Joomla 1 Joomla\! 2024-11-21 6.8 MEDIUM 6.3 MEDIUM
An issue was discovered in Joomla! through 3.9.19. A missing token check in the remove request section of com_privacy causes a CSRF vulnerability.
CVE-2020-13763 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 7.5 HIGH
In Joomla! before 3.9.19, the default settings of the global textfilter configuration do not block HTML inputs for Guest users.
CVE-2020-13762 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
In Joomla! before 3.9.19, incorrect input validation of the module tag option in com_modules allows XSS.
CVE-2020-13761 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
In Joomla! before 3.9.19, lack of input validation in the heading tag option of the "Articles - Newsflash" and "Articles - Categories" modules allows XSS.
CVE-2020-13760 1 Joomla 1 Joomla\! 2024-11-21 6.8 MEDIUM 8.8 HIGH
In Joomla! before 3.9.19, missing token checks in com_postinstall lead to CSRF.
CVE-2020-11891 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Joomla! before 3.9.17. Incorrect ACL checks in the access level section of com_users allow the unauthorized editing of usergroups.
CVE-2020-11890 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Joomla! before 3.9.17. Improper input validations in the usergroup table class could lead to a broken ACL configuration.
CVE-2020-11889 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Joomla! before 3.9.17. Incorrect ACL checks in the access level section of com_users allow the unauthorized deletion of usergroups.
CVE-2020-10243 1 Joomla 1 Joomla\! 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Joomla! before 3.9.16. The lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Featured Articles frontend menutype.
CVE-2020-10242 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Joomla! before 3.9.16. Inadequate handling of CSS selectors in the Protostar and Beez3 JavaScript allows XSS attacks.
CVE-2020-10241 1 Joomla 1 Joomla\! 2024-11-21 6.8 MEDIUM 8.8 HIGH
An issue was discovered in Joomla! before 3.9.16. Missing token checks in the image actions of com_templates lead to CSRF.
CVE-2020-10240 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Joomla! before 3.9.16. Missing length checks in the user table can lead to the creation of users with duplicate usernames and/or email addresses.
CVE-2020-10239 1 Joomla 1 Joomla\! 2024-11-21 6.5 MEDIUM 8.8 HIGH
An issue was discovered in Joomla! before 3.9.16. Incorrect Access Control in the SQL fieldtype of com_fields allows access for non-superadmin users.
CVE-2020-10238 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Joomla! before 3.9.16. Various actions in com_templates lack the required ACL checks, leading to various potential attack vectors.
CVE-2019-9714 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Joomla! before 3.9.4. The media form field lacks escaping, leading to XSS.
CVE-2019-9713 1 Joomla 1 Joomla\! 2024-11-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Joomla! before 3.9.4. The sample data plugins lack ACL checks, allowing unauthorized access.
CVE-2019-9712 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Joomla! before 3.9.4. The JSON handler in com_config lacks input validation, leading to XSS.
CVE-2019-9711 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Joomla! before 3.9.4. The item_title layout in edit views lacks escaping, leading to XSS.
CVE-2019-7744 1 Joomla 1 Joomla\! 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in Joomla! before 3.9.3. Inadequate filtering on URL fields in various core components could lead to an XSS vulnerability.
CVE-2019-7743 1 Joomla 1 Joomla\! 2024-11-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Joomla! before 3.9.3. The phar:// stream wrapper can be used for objection injection attacks because there is no protection mechanism (such as the TYPO3 PHAR stream wrapper) to prevent use of the phar:// handler for non .phar-files.