CVE-2015-8562
|
Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Published:
December 16, 2015; 04:59:06 PM -05:00
|
V2: 7.5 HIGH
|
CVE-2015-7899
|
The com_content component in Joomla! 3.x before 3.4.5 does not properly check ACLs, which allows remote attackers to obtain sensitive information via unspecified vectors.
Published:
October 29, 2015; 04:59:13 PM -04:00
|
V2: 5.0 MEDIUM
|
CVE-2015-7859
|
The com_contenthistory component in Joomla! 3.2 before 3.4.5 does not properly check ACLs, which allows remote attackers to obtain sensitive information via unspecified vectors.
Published:
October 29, 2015; 04:59:13 PM -04:00
|
V2: 5.0 MEDIUM
|
CVE-2015-7858
|
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7297.
Published:
October 29, 2015; 04:59:12 PM -04:00
|
V2: 7.5 HIGH
|
CVE-2015-7857
|
SQL injection vulnerability in the getListQuery function in administrator/components/com_contenthistory/models/history.php in Joomla! 3.2 before 3.4.5 allows remote attackers to execute arbitrary SQL commands via the list[select] parameter to index.php.
Published:
October 29, 2015; 04:59:11 PM -04:00
|
V2: 7.5 HIGH
|
CVE-2015-7297
|
SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7858.
Published:
October 29, 2015; 04:59:08 PM -04:00
|
V2: 7.5 HIGH
|
CVE-2015-6939
|
Cross-site scripting (XSS) vulnerability in the login module in Joomla! 3.4.x before 3.4.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Published:
September 18, 2015; 12:59:00 PM -04:00
|
V2: 4.3 MEDIUM
|
CVE-2015-6919
|
Cross-site scripting (XSS) vulnerability in the googleSearch (CSE) (com_googlesearch_cse) component 3.0.2 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the q parameter to index.php.
Published:
September 11, 2015; 04:59:01 PM -04:00
|
V2: 4.3 MEDIUM
|
CVE-2015-6513
|
Multiple SQL injection vulnerabilities in the J2Store (com_j2store) extension before 3.1.7 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) sortby or (2) manufacturer_ids[] parameter to index.php.
Published:
August 18, 2015; 11:59:13 AM -04:00
|
V2: 7.5 HIGH
|
CVE-2015-5397
|
Cross-site request forgery (CSRF) vulnerability in Joomla! 3.2.0 through 3.3.x and 3.4.x before 3.4.2 allows remote attackers to hijack the authentication of unspecified victims for requests that upload code via unknown vectors.
Published:
July 14, 2015; 12:59:04 PM -04:00
|
V2: 6.8 MEDIUM
|
CVE-2015-4654
|
SQL injection vulnerability in the EQ Event Calendar component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to eqfullevent.
Published:
June 18, 2015; 02:59:06 PM -04:00
|
V2: 7.5 HIGH
|
CVE-2014-8607
|
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.
Published:
June 10, 2015; 02:59:04 PM -04:00
|
V2: 2.1 LOW
|
CVE-2014-8606
|
Directory traversal vulnerability in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to read arbitrary files via a .. (dot dot) in the file parameter in a json_return action in the xcloner_show page to wp-admin/admin-ajax.php.
Published:
June 10, 2015; 02:59:03 PM -04:00
|
V2: 4.0 MEDIUM
|
CVE-2014-8605
|
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! stores database backup files with predictable names under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to a backup file in administrators/backups/.
Published:
June 10, 2015; 02:59:02 PM -04:00
|
V2: 5.0 MEDIUM
|
CVE-2014-8604
|
The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! returns the MySQL password in cleartext to a text box in the configuration panel, which allows remote attackers to obtain sensitive information via unspecified vectors.
Published:
June 10, 2015; 02:59:01 PM -04:00
|
V2: 5.0 MEDIUM
|
CVE-2014-8603
|
cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name, or (12) $sqlfile variable.
Published:
June 10, 2015; 02:59:00 PM -04:00
|
V2: 6.5 MEDIUM
|
CVE-2015-2562
|
Multiple SQL injection vulnerabilities in the Web-Dorado ECommerce WD (com_ecommercewd) component 1.2.5 for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) search_category_id, (2) sort_order, or (3) filter_manufacturer_ids in a displayproducts action to index.php.
Published:
March 20, 2015; 10:59:04 AM -04:00
|
V2: 7.5 HIGH
|
CVE-2015-1478
|
Cross-site scripting (XSS) vulnerability in the CMSJunkie J-ClassifiedsManager component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the view parameter to /classifieds.
Published:
February 04, 2015; 11:59:07 AM -05:00
|
V2: 4.3 MEDIUM
|
CVE-2015-1477
|
SQL injection vulnerability in the CMSJunkie J-ClassifiedsManager component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a viewad task to classifieds/offerring-ads.
Published:
February 04, 2015; 11:59:06 AM -05:00
|
V2: 7.5 HIGH
|
CVE-2014-100009
|
The Joomlaskin JS Multi Hotel (aka JS MultiHotel and Js-Multi-Hotel) plugin 2.2.1 and earlier for WordPress allows remote attackers to obtain the installation path via a request to (1) functions.php, (2) myCalendar.php, (3) refreshDate.php, (4) show_image.php, (5) widget.php, (6) phpthumb/GdThumb.inc.php, or (7) phpthumb/thumb_plugins/gd_reflection.inc.php in includes/.
Published:
January 13, 2015; 06:59:08 AM -05:00
|
V2: 5.0 MEDIUM
|