Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
joomla joomla! 1.7.1 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2012-0836
Unspecified vulnerability in Joomla! 1.7.x prior to 1.7.5 allows malicious users to read the error log via unknown vectors.
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
445
VMScore
CVE-2012-0837
Joomla! 1.7.x prior to 1.7.5 and 2.5.x prior to 2.5.1 allows malicious users to obtain the installation path via unspecified vectors related to "administrator."
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
445
VMScore
CVE-2012-0835
Unspecified vulnerability in Joomla! 1.7.x prior to 1.7.5 and 2.5.x prior to 2.5.1 allows malicious users to obtain sensitive information via unknown vectors related to "administrator."
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
755
VMScore
CVE-2012-1116
SQL injection vulnerability in Joomla! 1.7.x and 2.5.x prior to 2.5.2 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 2.5.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.5
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
1 EDB exploit
383
VMScore
CVE-2012-0822
Cross-site scripting (XSS) vulnerability in Joomla! 1.6 and 1.7.x prior to 1.7.4 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0820.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
445
VMScore
CVE-2012-0819
Unspecified vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2012-0821.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
383
VMScore
CVE-2012-0820
Cross-site scripting (XSS) vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0822.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
445
VMScore
CVE-2012-0821
Unspecified vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2012-0819.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
445
VMScore
CVE-2017-7988
In Joomla! 1.6.0 up to and including 3.6.5 (fixed in 3.7.0), inadequate filtering of form contents allows overwriting the author of an article.
Joomla Joomla! 3.4.0
Joomla Joomla! 3.5.0
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 3.6.0
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 1.5.26
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
Joomla Joomla! 1.6.3
Joomla Joomla! 3.3.5
Joomla Joomla! 2.5.22
Joomla Joomla! 3.4.4
Joomla Joomla! 3.4.2
Joomla Joomla! 3.4.1
766
VMScore
CVE-2015-8562
Joomla! 1.5.x, 2.x, and 3.x prior to 3.4.6 allow remote malicious users to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 1.5.26
Joomla Joomla! 1.5.11
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
Joomla Joomla! 1.6.3
Joomla Joomla! 1.5.13
Joomla Joomla! 2.5.22
Joomla Joomla! 3.4.4
Joomla Joomla! 1.5.3
Joomla Joomla! 3.4.2
Joomla Joomla! 3.3.4
Joomla Joomla! 2.5.8
2 EDB exploits
20 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6280
CVE-2024-5346
CVE-2024-30078
CVE-2022-45803
CVE-2024-36886
SQL
CVE-2024-24553
IMAP
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »