Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
joomla joomla! 3.0.4 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2018-7314
SQL Injection exists in the PrayerCenter 3.0.2 component for Joomla! via the sessionid parameter, a different vulnerability than CVE-2008-6429.
Mlwebtechnologies Prayercenter 3.0.2
1 EDB exploit
755
VMScore
CVE-2018-7177
SQL Injection exists in the Saxum Numerology 3.0.4 component for Joomla! via the publicid parameter.
Saxum2003 Numerology 3.0.4
1 EDB exploit
755
VMScore
CVE-2014-7228
Akeeba Restore (restore.php), as used in Joomla! 2.5.4 up to and including 2.5.25, 3.x up to and including 3.2.5, and 3.3.0 up to and including 3.3.4; Akeeba Backup for Joomla! Professional 3.0.0 up to and including 4.0.2; Backup Professional for WordPress 1.0.b1 up to and includ...
Joomla Joomla! 2.5.19
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 3.3.3
Joomla Joomla! 2.5.25
Joomla Joomla! 3.2.1
Joomla Joomla! 2.5.22
Joomla Joomla! 3.3.4
Joomla Joomla! 2.5.8
Joomla Joomla! 3.1.5
Joomla Joomla! 3.1.1
Joomla Joomla! 3.3.1
Joomla Joomla! 3.2.2
Joomla Joomla! 3.0.2
Joomla Joomla! 2.5.15
Joomla Joomla! 2.5.13
Joomla Joomla! 2.5.11
Joomla Joomla! 2.5.23
Joomla Joomla! 3.0.4
Joomla Joomla! 2.5.21
1 EDB exploit
685
VMScore
CVE-2013-5576
administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x prior to 2.5.14 and 3.x prior to 3.1.5 allows remote authenticated users or remote malicious users to bypass intended access restrictions and upload files with dangerous extensions via a fi...
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.8
Joomla Joomla! 2.5.2
Joomla Joomla! 2.5.13
Joomla Joomla! 2.5.11
Joomla Joomla! 2.5.1
Joomla Joomla! 2.5.3
Joomla Joomla! 2.5.10
Joomla Joomla! 2.5.9
Joomla Joomla! 2.5.4
Joomla Joomla! 2.5.6
Joomla Joomla! 2.5.12
Joomla Joomla! 2.5.5
Joomla Joomla! 2.5.0
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 3.1.1
Joomla Joomla! 3.0.2
Joomla Joomla! 3.0.4
Joomla Joomla! 3.0.3
Joomla Joomla! 3.0.1
Joomla Joomla! 3.1.0
1 EDB exploit
685
VMScore
CVE-2006-5048
Multiple PHP remote file inclusion vulnerabilities in Security Images (com_securityimages) component 3.0.5 and previous versions for Joomla! allow remote malicious users to execute arbitrary code via a URL in the mosConfig_absolute_path parameter in (1) configinsert.php, (2) lang...
Waltercedric Com Securityimages
Waltercedric Com Securityimages 2.2.5
Waltercedric Com Securityimages 2.2.6
Waltercedric Com Securityimages 3.00
Waltercedric Com Securityimages 3.0.3
Waltercedric Com Securityimages 3.0.4
1 EDB exploit
668
VMScore
CVE-2015-8769
SQL injection vulnerability in Joomla! 3.x prior to 3.4.7 allows malicious users to execute arbitrary SQL commands via unspecified vectors.
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 3.3.3
Joomla Joomla! 3.2.1
Joomla Joomla! 3.4.4
Joomla Joomla! 3.4.2
Joomla Joomla! 3.3.4
Joomla Joomla! 3.1.5
Joomla Joomla! 3.1.1
Joomla Joomla! 3.3.1
Joomla Joomla! 3.2.2
Joomla Joomla! 3.0.2
Joomla Joomla! 3.4.1
Joomla Joomla! 3.0.4
Joomla Joomla! 3.4.5
Joomla Joomla! 3.4.6
Joomla Joomla! 3.4.0
Joomla Joomla! 3.3.0
Joomla Joomla! 3.1.6
Joomla Joomla! 3.2.4
Joomla Joomla! 3.0.3
Joomla Joomla! 3.0.1
668
VMScore
CVE-2014-7984
Joomla! CMS 2.5.x prior to 2.5.19 and 3.x prior to 3.2.3 allows remote malicious users to authenticate and bypass intended restrictions via vectors involving GMail authentication.
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.17
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 3.2.1
Joomla Joomla! 2.5.8
Joomla Joomla! 3.1.5
Joomla Joomla! 3.1.1
Joomla Joomla! 3.2.2
Joomla Joomla! 3.0.2
Joomla Joomla! 2.5.15
Joomla Joomla! 2.5.2
Joomla Joomla! 2.5.13
Joomla Joomla! 2.5.11
Joomla Joomla! 2.5.1
Joomla Joomla! 3.0.4
Joomla Joomla! 3.1.6
Joomla Joomla! 3.0.3
Joomla Joomla! 3.0.1
Joomla Joomla! 2.5.3
Joomla Joomla! 2.5.10
Joomla Joomla! 2.5.9
578
VMScore
CVE-2017-11364
The CMS installer in Joomla! prior to 3.7.4 does not verify a user's ownership of a webspace, which allows remote authenticated users to gain control of the target application by leveraging Certificate Transparency logs.
Joomla Joomla! 1.0.5
Joomla Joomla! 3.4.0
Joomla Joomla! 3.5.0
Joomla Joomla! 1.6
Joomla Joomla! 1.6.4
Joomla Joomla! 2.5.19
Joomla Joomla! 3.6.0
Joomla Joomla! 2.5.7
Joomla Joomla! 3.7.3
Joomla Joomla! 2.5.17
Joomla Joomla! 1.5.24
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 1.7.1
Joomla Joomla! 3.3.3
Joomla Joomla! 3.7.0
Joomla Joomla! 2.5.25
Joomla Joomla! 1.0.9
Joomla Joomla! 1.5.26
Joomla Joomla! 1.5.11
Joomla Joomla! 3.2.1
Joomla Joomla! 1.5.25
555
VMScore
CVE-2013-3242
plugins/system/remember/remember.php in Joomla! 2.5.x prior to 2.5.10 and 3.0.x prior to 3.0.4 does not properly handle an object obtained by unserializing a cookie, which allows remote authenticated users to conduct PHP object injection attacks and cause a denial of service via ...
Joomla Joomla! 3.0.2
Joomla Joomla! 3.0.3
Joomla Joomla! 3.0.1
Joomla Joomla! 3.0.0
Joomla Joomla! 2.5.7
Joomla Joomla! 2.5.8
Joomla Joomla! 2.5.2
Joomla Joomla! 2.5.1
Joomla Joomla! 2.5.3
Joomla Joomla! 2.5.9
Joomla Joomla! 2.5.4
Joomla Joomla! 2.5.6
Joomla Joomla! 2.5.5
Joomla Joomla! 2.5.0
1 EDB exploit
516
VMScore
CVE-2015-5608
Open redirect vulnerability in Joomla! CMS 3.0.0 up to and including 3.4.1.
Joomla Joomla! 3.4.0
Joomla Joomla! 3.1.4
Joomla Joomla! 3.1.3
Joomla Joomla! 3.3.3
Joomla Joomla! 3.2.1
Joomla Joomla! 3.3.5
Joomla Joomla! 3.3.6
Joomla Joomla! 3.3.4
Joomla Joomla! 3.2.7
Joomla Joomla! 3.1.5
Joomla Joomla! 3.1.1
Joomla Joomla! 3.3.1
Joomla Joomla! 3.2.2
Joomla Joomla! 3.0.2
Joomla Joomla! 3.4.1
Joomla Joomla! 3.0.4
Joomla Joomla! 3.3.0
Joomla Joomla! 3.1.6
Joomla Joomla! 3.2.4
Joomla Joomla! 3.0.3
Joomla Joomla! 3.0.1
Joomla Joomla! 3.2.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
log injection
CVE-2024-37079
type confusion
CVE-2024-32943
CVE-2024-30103
CVE-2024-37350
arbitrary code
CVE-2024-6189
CVE-2024-6225
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »