Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
joomla joomla! 1.7.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0836
Unspecified vulnerability in Joomla! 1.7.x prior to 1.7.5 allows malicious users to read the error log via unknown vectors.
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
NA
CVE-2012-0835
Unspecified vulnerability in Joomla! 1.7.x prior to 1.7.5 and 2.5.x prior to 2.5.1 allows malicious users to obtain sensitive information via unknown vectors related to "administrator."
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
NA
CVE-2012-0837
Joomla! 1.7.x prior to 1.7.5 and 2.5.x prior to 2.5.1 allows malicious users to obtain the installation path via unspecified vectors related to "administrator."
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
NA
CVE-2012-1116
SQL injection vulnerability in Joomla! 1.7.x and 2.5.x prior to 2.5.2 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.4
Joomla Joomla! 2.5.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.5
Joomla Joomla! 1.7.3
Joomla Joomla! 2.5.0
Joomla Joomla! 1.7.2
1 EDB exploit
NA
CVE-2012-0819
Unspecified vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2012-0821.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
NA
CVE-2012-0820
Cross-site scripting (XSS) vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0822.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
NA
CVE-2012-0821
Unspecified vulnerability in Joomla! 1.6.x and 1.7.x prior to 1.7.4 allows remote malicious users to obtain sensitive information via unknown vectors, a different vulnerability than CVE-2012-0819.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
NA
CVE-2012-0822
Cross-site scripting (XSS) vulnerability in Joomla! 1.6 and 1.7.x prior to 1.7.4 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0820.
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 1.7.1
Joomla Joomla! 1.6.3
Joomla Joomla! 1.6.5
Joomla Joomla! 1.6.1
Joomla Joomla! 1.7.0
Joomla Joomla! 1.6.0
Joomla Joomla! 1.6.6
Joomla Joomla! 1.7.3
Joomla Joomla! 1.7.2
5.3
CVSSv3
CVE-2017-7988
In Joomla! 1.6.0 up to and including 3.6.5 (fixed in 3.7.0), inadequate filtering of form contents allows overwriting the author of an article.
Joomla Joomla! 3.4.0
Joomla Joomla! 3.5.0
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 3.6.0
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 1.5.26
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
Joomla Joomla! 1.6.3
Joomla Joomla! 3.3.5
Joomla Joomla! 2.5.22
Joomla Joomla! 3.4.4
Joomla Joomla! 3.4.2
Joomla Joomla! 3.4.1
NA
CVE-2015-8562
Joomla! 1.5.x, 2.x, and 3.x prior to 3.4.6 allow remote malicious users to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 1.5.26
Joomla Joomla! 1.5.11
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
Joomla Joomla! 1.6.3
Joomla Joomla! 1.5.13
Joomla Joomla! 2.5.22
Joomla Joomla! 3.4.4
Joomla Joomla! 1.5.3
Joomla Joomla! 3.4.2
Joomla Joomla! 3.3.4
Joomla Joomla! 2.5.8
2 EDB exploits
20 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-28995
CVE-2024-36680
CVE-2024-35537
unauthorized
CVE-2024-21518
CVE-2024-37673
cross-site scripting
SSRF
CVE-2024-6241
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »