/*====== google reCaptcha ======*/
German Chinese (Traditional) Czech Danish English Filipino French Greek Hebrew Hindi Hungarian Irish Italian Japanese Korean Norwegian Persian Polish Portuguese Russian Spanish Swedish Thai Turkish

Bewertung: 0 / 5

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
  • [20181001] - Core - Hardening com_contact contact form

    Security Announcements Oct 9, 2018 | 15:45 pm

    Project: Joomla!SubProject: CMSImpact: ModerateSeverity: LowVersions: 2.5.0 through 3.8.12Exploit type: Incorrect Access ControlReported Date: 2018-September-17Fixed Date: 2018-October-02CVE Number: CVE-2018-17859DescriptionInadequate checks in com_contact could allowed mail submission in disabled forms.Affected InstallsJoomla! CMS versions 2.5.0 through 3.8.12SolutionUpgrade to version 3.8.13ContactThe JSST at the[…]

  • [20180801] - Core - Hardening the InputFilter for PHAR stubs

    Security Announcements Aug 26, 2018 | 15:45 pm

    Project: Joomla!SubProject: CMSImpact: HighSeverity: LowVersions: 1.5.0 through 3.8.11Exploit type: Malicious file uploadReported Date: 2018-August-23Fixed Date: 2018-August-28CVE Number: CVE-2018-15882DescriptionInadequate checks in the InputFilter class could allow specifically prepared PHAR files to pass the upload filter.Affected InstallsJoomla! CMS versions 1.5.0 through 3.8.11SolutionUpgrade to[…]

  • [20180601] - Core - Local File Inclusion with PHP 5.3

    Security Announcements Jun 26, 2018 | 15:30 pm

    Project: Joomla!SubProject: CMSImpact: LowSeverity: LowVersions: 2.5.0 through 3.8.8Exploit type: LFIReported Date: 2018-April-23Fixed Date: 2018-June-26CVE Number: CVE-2018-12712DescriptionOur autoload code checks classnames to be valid, using the "class_exists" function in PHP. In PHP 5.3 this function validates invalid names as valid, which[…]




Beitrag teilen

Submit to DeliciousSubmit to DiggSubmit to FacebookSubmit to Google PlusSubmit to StumbleuponSubmit to TechnoratiSubmit to TwitterSubmit to LinkedIn


Go to top