Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Proin sed odio et ante adipiscing...
Nie zdefiniowano waluty dla sklepu! Skontaktuj się z administratorem, jeśli sam nim jesteś przejdź tutaj http://budek.biz/administrator/index.php?option=com_virtuemart&view=user&task=editshop
The lack of type casting of a variable in SQL statement leads to a SQL injection vulnerability in the User Notes list view
Joomla! CMS versions 3.5.0 through 3.8.5
Upgrade to version 3.8.6
The JSST at the Joomla! Security Centre.
The lack of type casting of a variable in SQL statement leads to a SQL injection vulnerability in the Hathor postinstall message.
Joomla! CMS versions 3.7.0 through 3.8.3
Upgrade to version 3.8.4
The JSST at the Joomla! Security Centre.
Inadequate input filtering in the Uri class (formerly JUri) leads to a XSS vulnerability.
Joomla! CMS versions 1.5.0 through 3.8.3
Upgrade to version 3.8.4
The JSST at the Joomla! Security Centre.
Inadequate input filtering in com_fields leads to a XSS vulnerability in multiple field types, i.e. list, radio and checkbox.
Joomla! CMS versions 3.7.0 through 3.8.3
Upgrade to version 3.8.4
The JSST at the Joomla! Security Centre.
Lack of escaping in the module chromes leads to XSS vulnerabilities in the module system.
Joomla! CMS versions 3.0.0 through 3.8.3
Upgrade to version 3.8.4
The JSST at the Joomla! Security Centre.
All manufacturer names, symbols, and descriptions, used in our images and text are used solely for identification purposes only.