Inadequate validation leads to path disclosure in administrator.
Joomla! version 2.5.0, 1.7.4, and all earlier 1.7.x versions
Upgrade to version 2.5.1 or 1.7.5 or higher
Reported by Jakub Galczyk
The JSST at the Joomla! Security Center.
On some servers the error log could be read by unauthorised users.
Joomla! version 1.7.4 and all earlier 1.7.x versions
Upgrade to version 2.5.1 or 1.7.5 or higher
Reported by Alain Rivest
The JSST at the Joomla! Security Center.
Inadequate validation leads to information disclosure in administrator.
Joomla! version 2.5.0, 1.7.4, and all earlier 1.7.x versions
Upgrade to version 1.7.5 or 2.5.1 or higher
Reported by Jakub Galczyk
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability.
Joomla! version 2.5.1 and 2.5.0.
Upgrade to version 2.5.2
Reported by Phil Purviance
The JSST at the Joomla! Security Center.
Inadequate escaping leads to SQL injection vulnerability.
Joomla! version 2.5.1, 2.5.0, 1.7.4, and all earlier 1.7.x versions
Upgrade to version 2.5.2
Reported by Ching Shiong Sow, Stratsec
The JSST at the Joomla! Security Center.
Programming error allows privilege escalation in some cases.
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Upgrade to version 2.5.3
Reported by Jeff Channel
The JSST at the Joomla! Security Center.
Insufficient randomness leads to password reset vulnerability.
Joomla! versions 2.5.2, 2.5.1, 2.5.0, and all 1.7.x and 1.6.x versions
Upgrade to version 2.5.3
Reported by George Argyros and Aggelos Kiayias
The JSST at the Joomla! Security Center.
Inadequate permission checking allows unauthorised viewing of administrative back end information.
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Upgrade to version 1.5.26
Reported by Cyrille Barthelemy
The JSST at the Joomla! Security Center.
Insufficient randomness leads to password reset vulnerability.
Joomla! versions 1.5.25 and all earlier 1.5.x versions
Upgrade to version 1.5.26
Reported by George Argyros and Aggelos Kiayias
The JSST at the Joomla! Security Center.
Inadequate filtering in update manager leads to XSS vulnerability.
Joomla! versions 2.5.3 and all earlier 2.5.x versions
Upgrade to version 2.5.4
Reported by Alex Andreae
The JSST at the Joomla! Security Center.