Joomla is an award-winning content management system (CMS) which enables you to build Web sites and powerful online applications. Many aspects including its ease-of-use and extensibility have made Joomla the most popular Web site software available. Best of all Joomla is an open source solution that is freely available to everyone.
Joomla Core 3.x.x SQL Injection
Critical
Joomla Core 2.5.x Arbitrary File Upload
Critical
Joomla Core Remote Code Execution
Critical
Joomla Improper Neutralization of Special Elements used in an LDAP Query (LDAP Injection) Vulnerability
Critical
Joomla Core 3.9.x Directory Traversal
Critical
Joomla Core 1.5.x Security Bypass
Critical
Joomla Improper Input Validation Vulnerability
Critical
Joomla Improper Access Control Vulnerability
Critical
Joomla Credentials Management Errors Vulnerability
Critical
Joomla Core 3.x.x SQL Injection
Critical
Joomla Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Joomla Core 4.x.x Multiple Vulnerabilities
Critical
Joomla Core 4.0.0 Security Bypass
Critical
Joomla Core 4.x.x Multiple Vulnerabilities
Critical
Joomla Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Joomla Other Vulnerability
Critical
Joomla Improper Neutralization of Special Elements used in a Command (Command Injection) Vulnerability
Critical
Joomla Deserialization of Untrusted Data Vulnerability
Critical
Joomla Other Vulnerability
Critical
Joomla Inconsistent Interpretation of HTTP Requests (HTTP Request/Response Smuggling) Vulnerability
Critical
Joomla Other Vulnerability
Critical
Joomla Improper Authentication Vulnerability
Critical
Joomla Improper Neutralization of Formula Elements in a CSV File Vulnerability
Critical
Joomla Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Joomla Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Critical
Joomla Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Joomla Deserialization of Untrusted Data Vulnerability
Critical
Joomla Incorrect Authorization Vulnerability
Critical
Joomla Core 1.5.12 Arbitrary File Upload
Critical
Joomla Unrestricted Upload of File with Dangerous Type Vulnerability
Critical