Search Results (605 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2020-35612 1 Joomla 1 Joomla\! 2026-02-24 7.5 High
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability.
CVE-2020-35614 1 Joomla 1 Joomla\! 2026-02-24 5.3 Medium
An issue was discovered in Joomla! 3.9.0 through 3.9.22. Improper handling of the username leads to a user enumeration attack vector in the backend login page.
CVE-2020-35611 1 Joomla 1 Joomla\! 2026-02-24 7.5 High
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The globlal configuration page does not remove secrets from the HTML output, disclosing the current values.
CVE-2020-35615 1 Joomla 1 Joomla\! 2026-02-24 6.3 Medium
An issue was discovered in Joomla! 2.5.0 through 3.9.22. A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability.
CVE-2020-35613 1 Joomla 1 Joomla\! 2026-02-24 9.8 Critical
An issue was discovered in Joomla! 3.0.0 through 3.9.22. Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list.
CVE-2020-35616 1 Joomla 1 Joomla\! 2026-02-24 7.5 High
An issue was discovered in Joomla! 1.7.0 through 3.9.22. Lack of input validation while handling ACL rulesets can cause write ACL violations.
CVE-2020-35610 1 Joomla 1 Joomla\! 2026-02-24 7.5 High
An issue was discovered in Joomla! 2.5.0 through 3.9.22. The autosuggestion feature of com_finder did not respect the access level of the corresponding terms.
CVE-2025-63083 1 Joomla 3 Joomla, Joomla!, Joomla\! 2026-01-30 6.1 Medium
Lack of output escaping leads to a XSS vector in the pagebreak plugin.
CVE-2025-63082 1 Joomla 3 Joomla, Joomla!, Joomla\! 2026-01-30 6.1 Medium
Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags.
CVE-2023-23752 1 Joomla 1 Joomla\! 2025-10-24 5.3 Medium
An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.
CVE-2016-10033 3 Joomla, Phpmailer Project, Wordpress 3 Joomla\!, Phpmailer, Wordpress 2025-10-22 9.8 Critical
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
CVE-2024-27184 1 Joomla 1 Joomla\! 2025-06-04 6.1 Medium
Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not..
CVE-2024-27185 2 Joomial Project, Joomla 2 Joomial Cms, Joomla\! 2025-06-04 9.1 Critical
The pagination class includes arbitrary parameters in links, leading to cache poisoning attack vectors.
CVE-2024-27186 1 Joomla 1 Joomla\! 2025-06-04 6.1 Medium
The mail template feature lacks an escaping mechanism, causing XSS vectors in multiple extensions.
CVE-2024-27187 1 Joomla 1 Joomla\! 2025-06-04 7.5 High
Improper Access Controls allows backend users to overwrite their username when disallowed.
CVE-2024-40743 1 Joomla 1 Joomla\! 2025-06-04 6.1 Medium
The stripImages and stripIframes methods didn't properly process inputs, leading to XSS vectors.
CVE-2024-40747 1 Joomla 1 Joomla\! 2025-06-04 6.1 Medium
Various module chromes didn't properly process inputs, leading to XSS vectors.
CVE-2024-40748 1 Joomla 1 Joomla\! 2025-06-04 7.5 High
Lack of output escaping in the id attribute of menu lists.
CVE-2024-40749 1 Joomla 1 Joomla\! 2025-06-04 7.5 High
Improper Access Controls allows access to protected views.
CVE-2025-25226 1 Joomla 1 Joomla\! 2025-06-04 9.8 Critical
Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.