Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Joomla! Project | Joomla! CMS | 2.5.0-3.10.6 & 4.0.0-4.1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2022-23793 | [20220301] - Core - Zip Slip within the Tar extractor | |
| CVE-2022-23794 | [20220302] - Core - Path Disclosure within filesystem error messages | |
| CVE-2022-23795 | [20220303] - Core - User row are not bound to a authentication mechanism | |
| CVE-2022-23796 | [20220304] - Core - Missing input validation within com_fields class inputs | |
| CVE-2022-23797 | [20220305] - Core - Inadequate filtering on the selected Ids | |
| CVE-2022-23799 | [20220307] - Core - Variable Tampering on JInput $_REQUEST data | |
| CVE-2022-23800 | [20220308] - Core - Inadequate content filtering within the filter code | |
| CVE-2022-23801 | [20220309] - Core - XSS attack vector through SVG |
No comments yet