logo soluprotech 2015Demande de renseignements 

Conseils, Etudes, Devis           0811 690 272 Prix d'un appel local 0.05€TTC minutes

Prix pour les professionnels      Tous nos produits ne sont pas sur le site contactez-nous 

Le paiement sécurisé par   logocbpaypal

0
Panier
Votre panier est vide.

Translate

French English German Italian Portuguese Russian Spanish

Recherchez un produit

Panier

 x 

Panier Vide

Informations de sécurité Joomla!

    • Project: Joomla!
    • SubProject: CMS
    • Impact:Moderate
    • Severity: Low
    • Versions: 2.5.0 through 3.8.12
    • Exploit type: CSRF
    • Reported Date: 2018-September-26
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17858

    Description

    Added additional CSRF hardening in com_installer actions in the backend.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Raviraj A. Powar
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Moderate
    • Severity: Low
    • Versions: 1.5.0 through 3.8.12
    • Exploit type: ACL Violation
    • Reported Date: 2017-December-27
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17855

    Description

    In case that an attacker gets access to the mail account of an user who can approve admin verifications in the registration process he can activate himself.

    Affected Installs

    Joomla! CMS versions 1.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Paul Freeman
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Moderate
    • Severity: Low
    • Versions: 3.1.0 through 3.8.12
    • Exploit type: ACL Violation
    • Reported Date: 2018-June-20
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17857

    Description

    Inadequate checks on the tags search fields can lead to an access level violation.

    Affected Installs

    Joomla! CMS versions 3.1.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Андрей Капитанов
    • Project: Joomla!
    • SubProject: CMS
    • Impact:High
    • Severity: Low
    • Versions: 2.5.4 through 3.8.12
    • Exploit type: Object Injection
    • Reported Date: 2018-June-21
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17856

    Description

    Joomla’s com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled access of Administrator-level users to access com_joomlaupdate and trigger a code execution.

    Affected Installs

    Joomla! CMS versions 2.5.4 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By:Codesafescan
    • Project: Joomla!
    • SubProject: CMS
    • Impact:Moderate
    • Severity: Low
    • Versions: 2.5.0 through 3.8.12
    • Exploit type: Incorrect Access Control
    • Reported Date: 2018-September-17
    • Fixed Date: 2018-October-02
    • CVE Number: CVE-2018-17859

    Description

    Inadequate checks in com_contact could allowed mail submission in disabled forms.

    Affected Installs

    Joomla! CMS versions 2.5.0 through 3.8.12

    Solution

    Upgrade to version 3.8.13

    Contact

    The JSST at the Joomla! Security Centre.

    Reported By: David Jardin (JSST)

Équipement de Protection Individuelle (EPI) - Équipements de protection collective (EPC)

EPI - Equipement de Protection Individuelle - Equipement de sécurité

Détection gaz - centrale - capteur - sonde

Détection gaz - centrale - capteur - sonde

Communication - Radio - Téléphonie

Communication - Radio - Téléphonie

Sécurité électrique

Sécurité électrique Catu soluprotech

Lampes-Eclairage de sécurité

Lampes-Eclairage de sécurité

Coffret - Boite - sac pour le transport

Coffret - Boite pour le transport soluprotech