Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
joomla joomla 1.0.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1049
Multiple SQL injection vulnerabilities in the Admin functionality in Joomla! 1.0.7 and previous versions allow remote authenticated administrators to execute arbitrary SQL commands via unknown attack vectors.
Joomla Joomla
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.6
Joomla Joomla 1.0.4
Joomla Joomla 1.0.2
Joomla Joomla 1.0.5
Joomla Joomla 1.0.0
NA
CVE-2006-0303
Multiple unspecified vulnerabilities in the (1) publishing component, (2) Contact Component, (3) TinyMCE Compressor, and (4) other components in Joomla! 1.0.5 and previous versions have unknown impact and attack vectors.
Joomla Joomla 1.0
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.4
Joomla Joomla 1.0.2
Joomla Joomla 1.0.5
NA
CVE-2005-3773
Unspecified vulnerability in Joomla! prior to 1.0.4 has unknown impact and attack vectors, related to "Potential misuse of Media component file management functions."
Joomla Joomla 1.0
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.2
NA
CVE-2005-3771
Multiple cross-site scripting (XSS) vulnerabilities in Joomla! prior to 1.0.4 allow remote malicious users to inject arbitrary web script or HTML via (1) "GET and other variables" and (2) "SEF".
Joomla Joomla 1.0
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.2
NA
CVE-2005-3772
Multiple SQL injection vulnerabilities in Joomla! prior to 1.0.4 allow remote malicious users to execute arbitrary SQL commands via the (1) Itemid variable in the Polls modules and (2) multiple unspecified methods in the mosDBTable class.
Joomla Joomla 1.0
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege
CVE-2022-48762
CVE-2022-48751
CVE-2024-37079
CVE-2024-30848
LFI
man-in-the-middle
CVE-2022-48736
CVE-2024-30103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4