Home Ленты новостей Новости безопасности Joomla!
Newsfeeds
Joomla! Developer - Vulnerability News
Not only is Joomla! easy to use, but it is easy to add extra functionality through a flexible and powerful developer framework. The Joomla! Framework allows you to build exceptional extensions for Joomla! including components, modules, plugins, templates and language packs.

  • [20100704] - Core - XSS Vulnerabillitis in Back End
    • Project: Joomla!
    • SubProject: All
    • Severity: Medium
    • Versions: 1.5.19 and all previous 1.5 releases
    • Exploit type: XSS Injection
    • Reported Date: 2010-June-1
    • Fixed Date: 2010-July-15

    Description

    Back-end user can inject Javascript in various administrator screens.

    Affected Installs

    All 1.5.x installs prior to and including 1.5.19 are affected.

    Solution

    Upgrade to the latest Joomla! version (1.5.20 or later)

    Reported by Mesut Timur.

    Contact

    The JSST at the Joomla! Security Center.



  • [20100703] - Core - XSS Vulnerabillitis in Back End
    • Project: Joomla!
    • SubProject: All
    • Severity: Medium
    • Versions: 1.5.19 and all previous 1.5 releases
    • Exploit type: XSS Injection
    • Reported Date: 2010-June-8
    • Fixed Date: 2010-July-15

    Description

    Back-end user can inject Javascript in various administrator screens.

    Affected Installs

    All 1.5.x installs prior to and including 1.5.19 are affected.

    Solution

    Upgrade to the latest Joomla! version (1.5.20 or later)

    Reported by José Antonio Vázquez González

    Contact

    The JSST at the Joomla! Security Center.



  • [20100702] - Core - XSS Vulnerabillitis in Back End
    • Project: Joomla!
    • SubProject: All
    • Severity: Medium
    • Versions: 1.5.19 and all previous 1.5 releases
    • Exploit type: XSS Injection
    • Reported Date: 2010-June-8
    • Fixed Date: 2010-July-15

    Description

    Back-end user can inject Javascript in various administrator screens.

    Affected Installs

    All 1.5.x installs prior to and including 1.5.19 are affected.

    Solution

    Upgrade to the latest Joomla! version (1.5.20 or later)

    Reported by José Antonio Vázquez González

    Contact

    The JSST at the Joomla! Security Center.



  • [20100701] - Core - SQL Injection / Internal Path Exposure
    • Project: Joomla!
    • SubProject: All
    • Severity: Low
    • Versions: 1.5.19 and all previous 1.5 releases
    • Exploit type: Internal Path Exposure
    • Reported Date: 2010-June-10
    • Fixed Date: 2010-July-15

    Description

    Back-end user can create MySQL error which shows internal path information in the error message.

    Affected Installs

    All 1.5.x installs prior to and including 1.5.19 are affected.

    Solution

    Upgrade to the latest Joomla! version (1.5.20 or later)

    Reported by Andy Gorges

    Contact

    The JSST at the Joomla! Security Center.



  • [20100501] - Core - XSS Vulnerabilities in Back End
    • Project: Joomla!
    • SubProject: All
    • Severity: High
    • Versions: 1.5.17 and all previous 1.5 releases
    • Exploit type: XSS Injection
    • Reported Date: 2010-May-13
    • Fixed Date: 2010-May-28

    Description

    Back-end user can inject javascript in various administrator screens.

    Affected Installs

    All 1.5.x installs prior to and including 1.5.17 are affected.

    Solution

    Upgrade to the latest Joomla! version (1.5.18 or later)

    Reported by Riyaz Ahemed

    Contact

    The JSST at the Joomla! Security Center.



Баннер
© 2010 PrintUnit. Все права защищены.
Joomla! — свободное программное обеспечение, распространяемое по лицензии GNU/GPL.