Questo sito utilizza cookie, anche di terze parti, per migliorare la tua esperienza e offrire servizi in linea con le tue preferenze. Chiudendo questo banner, scorrendo questa pagina o cliccando qualunque suo elemento acconsenti all’uso dei cookie.

<br />
<b>Notice</b>:  Undefined variable: slidescaption1 in <b>/home/edoardon/www2/lugducale/templates/jaxstorm-blue/index.php</b> on line <b>186</b><br />
<br />
<b>Notice</b>:  Undefined variable: slidescaption2 in <b>/home/edoardon/www2/lugducale/templates/jaxstorm-blue/index.php</b> on line <b>189</b><br />
<br />
<b>Notice</b>:  Undefined variable: slidescaption3 in <b>/home/edoardon/www2/lugducale/templates/jaxstorm-blue/index.php</b> on line <b>192</b><br />

Joomla! Security News

    • Project: Joomla!
    • SubProject: CMS
    • Severity: High
    • Versions: 3.7.0
    • Exploit type: SQL Injection
    • Reported Date: 2017-May-11
    • Fixed Date: 2017-May-17
    • CVE Number: CVE-2017-8917

    Description

    Inadequate filtering of request data leads to a SQL Injection vulnerability.

    Affected Installs

    Joomla! CMS versions 3.7.0

    Solution

    Upgrade to version 3.7.1

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Marc-Alexandre Montpas / sucuri.net
    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 3.4.0 through 3.6.5
    • Exploit type: Information Disclosure
    • Reported Date: 2016-Feb-06
    • Fixed Date: 2017-April-25
    • CVE Number: CVE-2017-8057

    Description

    Multiple files caused full path disclosures on systems with enabled error reporting.

    Affected Installs

    Joomla! CMS versions 3.4.0 through 3.6.5

    Solution

    Upgrade to version 3.7.0

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Sim of tencent security
    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 3.2.0 through 3.6.5
    • Exploit type: ACL Violation
    • Reported Date: 2017-March-01
    • Fixed Date: 2017-April-25
    • CVE Number: CVE-2017-7989

    Description

    Inadequate mime type checks allowed low-privilege users to upload swf files even if they were explicitly forbidden.

    Affected Installs

    Joomla! CMS versions 3.2.0 through 3.6.5

    Solution

    Upgrade to version 3.7.0

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: Abdullah Hussam
    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 1.6.0 through 3.6.5
    • Exploit type: ACL Violation
    • Reported Date: 2016-April-29
    • Fixed Date: 2017-April-25
    • CVE Number: CVE-2017-7988

    Description

    Inadequate filtering of form contents lead allow to overwrite the author of an article.

    Affected Installs

    Joomla! CMS versions 1.6.0 through 3.6.5

    Solution

    Upgrade to version 3.7.0

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: T-Systems Multimedia Solutions
    • Project: Joomla!
    • SubProject: CMS
    • Severity: Low
    • Versions: 3.2.0 through 3.6.5
    • Exploit type: XSS
    • Reported Date: 2016-February-28
    • Fixed Date: 2017-April-25
    • CVE Number: CVE-2017-7987

    Description

    Inadequate escaping of file and folder names leads to XSS vulnerabilities in the template manager component.

    Affected Installs

    Joomla! CMS versions 3.2.0 through 3.6.5

    Solution

    Upgrade to version 3.7.0

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: David Jardin

Chi è on line

Abbiamo 69 visitatori e nessun utente online