Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Joomla! Project | Joomla! CMS | 3.2.0-3.9.24 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-23129 | [20210303] - Core - XSS within alert messages showed to users | |
| CVE-2021-23130 | [20210304] - Core - XSS within the feed parser library | |
| CVE-2021-23131 | [20210305] - Core - Input validation within the template manager | |
| CVE-2021-23132 | [20210306] - Core - com_media allowed paths that are not intended for image uploads | |
| CVE-2021-26027 | [20210307] - Core - ACL violation within com_content frontend editing | |
| CVE-2021-26028 | [20210308] - Core - Path Traversal within joomla/archive zip class | |
| CVE-2021-26029 | [20210309] - Core - Inadequate filtering of form contents could allow to overwrite the aut | |
| CVE-2021-23126 | [20210301] - Core - Insecure randomness within 2FA secret generation | |
| CVE-2021-23127 | [20210301] - Core - Insecure randomness within 2FA secret generation |
No comments yet