Filtered by vendor Joomla Subscriptions
Filtered by product Joomla\! Subscriptions
Total 589 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2018-11321 1 Joomla 1 Joomla\! 2024-08-05 N/A
An issue was discovered in com_fields in Joomla! Core before 3.8.8. Inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option.
CVE-2018-11323 1 Joomla 1 Joomla\! 2024-08-05 N/A
An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to modify the access levels of user groups with higher permissions.
CVE-2018-11327 1 Joomla 1 Joomla\! 2024-08-05 N/A
An issue was discovered in Joomla! Core before 3.8.8. Inadequate checks allowed users to see the names of tags that were either unpublished or published with restricted view permission.
CVE-2018-8045 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! 3.5.0 through 3.8.5, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the User Notes list view.
CVE-2018-6377 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! before 3.8.4, inadequate input filtering in com_fields leads to an XSS vulnerability in multiple field types, i.e., list, radio, and checkbox
CVE-2018-6378 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! Core before 3.8.8, inadequate filtering of file and folder names leads to various XSS attack vectors in the media manager.
CVE-2018-6379 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! before 3.8.4, inadequate input filtering in the Uri class (formerly JUri) leads to an XSS vulnerability.
CVE-2018-6380 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! before 3.8.4, lack of escaping in the module chromes leads to XSS vulnerabilities in the module system.
CVE-2018-6376 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.
CVE-2019-19846 1 Joomla 1 Joomla\! 2024-08-05 9.8 Critical
In Joomla! before 3.9.14, the lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.
CVE-2019-19845 1 Joomla 1 Joomla\! 2024-08-05 5.3 Medium
In Joomla! before 3.9.14, a missing access check in framework files could lead to a path disclosure.
CVE-2019-18674 1 Joomla 1 Joomla\! 2024-08-05 5.3 Medium
An issue was discovered in Joomla! before 3.9.13. A missing access check in the phputf8 mapping files could lead to a path disclosure.
CVE-2019-18650 1 Joomla 1 Joomla\! 2024-08-05 8.8 High
An issue was discovered in Joomla! before 3.9.13. A missing token check in com_template causes a CSRF vulnerability.
CVE-2019-16725 1 Joomla 1 Joomla\! 2024-08-05 6.1 Medium
In Joomla! 3.x before 3.9.12, inadequate escaping allowed XSS attacks using the logo parameter of the default templates.
CVE-2019-15028 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! before 3.9.11, inadequate checks in com_contact could allow mail submission in disabled forms.
CVE-2019-14654 1 Joomla 1 Joomla\! 2024-08-05 N/A
In Joomla! 3.9.7 and 3.9.8, inadequate filtering allows users authorised to create custom fields to manipulate the filtering options and inject an unvalidated option. In other words, the filter attribute in subform fields allows remote code execution. This is fixed in 3.9.9.
CVE-2019-12764 1 Joomla 1 Joomla\! 2024-08-04 6.5 Medium
An issue was discovered in Joomla! before 3.9.7. The update server URL of com_joomlaupdate can be manipulated by non Super-Admin users.
CVE-2019-12765 1 Joomla 1 Joomla\! 2024-08-04 9.8 Critical
An issue was discovered in Joomla! before 3.9.7. The CSV export of com_actionslogs is vulnerable to CSV injection.
CVE-2019-12766 1 Joomla 1 Joomla\! 2024-08-04 6.1 Medium
An issue was discovered in Joomla! before 3.9.7. The subform fieldtype does not sufficiently filter or validate input of subfields. This leads to XSS attack vectors.
CVE-2019-11809 1 Joomla 1 Joomla\! 2024-08-04 N/A
An issue was discovered in Joomla! before 3.9.6. The debug views of com_users do not properly escape user supplied data, which leads to a potential XSS attack vector.