Joomla! CMS versions 4.0.0-4.2.4
Upgrade to version 4.2.5
The JSST at the Joomla! Security Centre.
Joomla! CMS versions 4.0.0-4.2.3
Upgrade to version 4.2.4
The JSST at the Joomla! Security Centre.
Joomla! CMS versions 4.0.0-4.2.3
Upgrade to version 4.2.4
The JSST at the Joomla! Security Centre.
Joomla! CMS versions 4.2.0
Upgrade to version 4.2.1
The JSST at the Joomla! Security Centre.
Extracting an specifilcy crafted tar package could write files outside of the intended path.
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Upgrade to version 3.10.7 or 4.1.1
The JSST at the Joomla! Security Centre.
Uploading a file name of an excess length causes the error. This error brings up the screen with the path of the source code of the web application.
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Upgrade to version 3.10.7 or 4.1.1
The JSST at the Joomla! Security Centre.
A user row was not bound to a specific authentication mechanism which could under very special circumstances allow an account takeover.
Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
Upgrade to version 3.10.7 or 4.1.1
The JSST at the Joomla! Security Centre.
Lack of input validation could allow an XSS attack using com_fields
Joomla! CMS versions 3.7.0 - 3.10.6
Upgrade to version 3.10.7
The JSST at the Joomla! Security Centre.
Inadequate filtering on the selected Ids on an request could resulted into an possible SQL injection.
Joomla! CMS versions 3.0.0 - 3.10.6 & 4.0.0 - 4.1.0
Upgrade to version 3.10.7 & 4.1.1
The JSST at the Joomla! Security Centre.
Inadequate validation of URLs could result into an invalid check whether an redirect URL is internal or not.
Joomla! CMS versions 2.5.0 - 3.10.6 & 4.0.0 - 4.1.0
Upgrade to version 3.10.7 & 4.1.1
The JSST at the Joomla! Security Centre.