National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): Joomla
  • Search Type: Search All
There are 1,039 matching records.
Displaying matches 201 through 220.
Vuln ID Summary CVSS Severity
CVE-2016-1000121

XSS and SQLi in Huge IT Joomla Slider v1.0.9 extension

Published: October 27, 2016; 05:59:02 PM -04:00
V3: 4.8 MEDIUM
V2: 3.5 LOW
CVE-2016-1000120

SQLi and XSS in Huge IT catalog extension v1.0.4 for Joomla

Published: October 27, 2016; 05:59:00 PM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000119

SQLi and XSS in Huge IT catalog extension v1.0.4 for Joomla

Published: October 21, 2016; 10:59:05 AM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000118

XSS & SQLi in HugeIT slideshow v1.0.4

Published: October 21, 2016; 10:59:04 AM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000117

XSS & SQLi in HugeIT slideshow v1.0.4

Published: October 21, 2016; 10:59:03 AM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000116

Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS

Published: October 21, 2016; 10:59:01 AM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000115

Huge-IT Portfolio Gallery manager v1.1.0 SQL Injection and XSS

Published: October 21, 2016; 10:59:00 AM -04:00
V3: 7.2 HIGH
V2: 6.5 MEDIUM
CVE-2016-1000125

Unauthenticated SQL Injection in Huge-IT Catalog v1.0.7 for Joomla

Published: October 06, 2016; 10:59:23 AM -04:00
V3: 9.8 CRITICAL
V2: 7.5 HIGH
CVE-2016-1000124

Unauthenticated SQL Injection in Huge-IT Portfolio Gallery Plugin v1.0.6

Published: October 06, 2016; 10:59:22 AM -04:00
V3: 9.8 CRITICAL
V2: 7.5 HIGH
CVE-2016-1000123

Unauthenticated SQL Injection in Huge-IT Video Gallery v1.0.9 for Joomla

Published: October 06, 2016; 10:59:21 AM -04:00
V3: 9.8 CRITICAL
V2: 7.5 HIGH
CVE-2016-1000114

XSS in huge IT gallery v1.1.5 for Joomla

Published: October 06, 2016; 10:59:20 AM -04:00
V3: 6.1 MEDIUM
V2: 4.3 MEDIUM
CVE-2016-1000113

XSS and SQLi in huge IT gallery v1.1.5 for Joomla

Published: October 06, 2016; 10:59:19 AM -04:00
V3: 9.8 CRITICAL
V2: 7.5 HIGH
CVE-2015-8769

SQL injection vulnerability in Joomla! 3.x before 3.4.7 allows attackers to execute arbitrary SQL commands via unspecified vectors.

Published: January 12, 2016; 03:59:07 PM -05:00
V3: 7.3 HIGH
V2: 7.5 HIGH
CVE-2015-8566

The Session package 1.x before 1.3.1 for Joomla! Framework allows remote attackers to execute arbitrary code via unspecified session values.

Published: December 16, 2015; 04:59:11 PM -05:00
V2: 7.5 HIGH
CVE-2015-8565

Directory traversal vulnerability in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.6 allows remote attackers to have unspecified impact via unknown vectors.

Published: December 16, 2015; 04:59:09 PM -05:00
V2: 7.5 HIGH
CVE-2015-8564

Directory traversal vulnerability in Joomla! 3.4.x before 3.4.6 allows remote attackers to have unspecified impact via directory traversal sequences in the XML install file in an extension package archive.

Published: December 16, 2015; 04:59:08 PM -05:00
V2: 7.5 HIGH
CVE-2015-8563

Cross-site request forgery (CSRF) vulnerability in the com_templates component in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.6 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Published: December 16, 2015; 04:59:07 PM -05:00
V2: 6.8 MEDIUM
CVE-2015-8562

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.

Published: December 16, 2015; 04:59:06 PM -05:00
V2: 7.5 HIGH
CVE-2015-7899

The com_content component in Joomla! 3.x before 3.4.5 does not properly check ACLs, which allows remote attackers to obtain sensitive information via unspecified vectors.

Published: October 29, 2015; 04:59:13 PM -04:00
V2: 5.0 MEDIUM
CVE-2015-7859

The com_contenthistory component in Joomla! 3.2 before 3.4.5 does not properly check ACLs, which allows remote attackers to obtain sensitive information via unspecified vectors.

Published: October 29, 2015; 04:59:13 PM -04:00
V2: 5.0 MEDIUM