Page 29 of 804 results (0.007 seconds)

CVSS: 9.8EPSS: 17%CPEs: 1EXPL: 1

In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message. En Joomla!, en versiones anteriores a la 3.8.4, la falta de casting de tipos en una variable de una instrucción SQL conduce a una vulnerabilidad de inyección SQL en el mensaje Hathor posinstalación. • https://github.com/knqyf263/CVE-2018-6376 http://www.securityfocus.com/bid/102916 http://www.securitytracker.com/id/1040316 https://developer.joomla.org/security-centre/722-20180105-core-sqli-vulnerability.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 3%CPEs: 1EXPL: 0

In Joomla! before 3.8.4, lack of escaping in the module chromes leads to XSS vulnerabilities in the module system. En Joomla!, en versiones anteriores a la 3.8.4, la falta de escapado en el módulo chromes conduce a vulnerabilidades de XSS en el sistema de módulos. • http://www.securityfocus.com/bid/102921 http://www.securitytracker.com/id/1040316 https://developer.joomla.org/security-centre/718-20180101-core-xss-vulnerability.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 3%CPEs: 1EXPL: 0

In Joomla! before 3.8.4, inadequate input filtering in com_fields leads to an XSS vulnerability in multiple field types, i.e., list, radio, and checkbox En Joomla!, en versiones anteriores a la 3.8.4, el filtrado de entradas inadecuado en com_fields lleva a una vulnerabilidad de XSS en múltiples tipos de campo, por ejemplo, list, radio y checkbox. • http://www.securityfocus.com/bid/102917 http://www.securitytracker.com/id/1040316 https://developer.joomla.org/security-centre/720-20180103-core-xss-vulnerability.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

In Joomla! before 3.8.2, a bug allowed third parties to bypass a user's 2-factor authentication method. En Joomla! en versiones anteriores a la 3.8.2, un error permitía a terceras partes omitir el método de autenticación de doble factor de un usuario. • http://www.securityfocus.com/bid/101701 http://www.securitytracker.com/id/1039757 https://developer.joomla.org/security-centre/713-20171102-core-2-factor-authentication-bypass • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

In Joomla! before 3.8.2, a logic bug in com_fields exposed read-only information about a site's custom fields to unauthorized users. En Joomla! en versiones anteriores a la 3.8.2, un error de lógica en com_fields exponía información de solo lectura sobre los campos personalizados de una página a usuarios no autorizados. • http://www.securityfocus.com/bid/101702 http://www.securitytracker.com/id/1039757 https://developer.joomla.org/security-centre/715-20171103-core-information-disclosure.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •