vulnerability
FreeBSD: VID-c0ef061a-c7f0-11e6-ae1b-002590263bf5: Joomla! -- multiple vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Dec 22, 2016 | Dec 10, 2025 | Dec 10, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Dec 22, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
The JSST and the Joomla! Security Center report: [20151206] - Core - Session Hardening The Joomla Security Strike team has been following up on the critical security vulnerability patched last week. Since the recent update it has become clear that the root cause is a bug in PHP itself. This was fixed by PHP in September of 2015 with the releases of PHP 5.4.45, 5.5.29, 5.6.13 (Note that this is fixed in all versions of PHP 7 and has been back-ported in some specific Linux LTS versions of PHP 5.3). This fixes the bug across all supported PHP versions. [20151207] - Core - SQL Injection Inadequate filtering of request data leads to a SQL Injection vulnerability.
Solution
freebsd-upgrade-package-joomla3
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.