joyplus-cms_project CVE Vulnerabilities & Metrics

Focus on joyplus-cms_project vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About joyplus-cms_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with joyplus-cms_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total joyplus-cms_project CVEs: 15
Earliest CVE date: 15 Mar 2018, 01:29 UTC
Latest CVE date: 20 Jun 2023, 15:15 UTC

Latest CVE reference: CVE-2020-20636

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical joyplus-cms_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.96

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 6
7.0-8.9 4
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS joyplus-cms_project CVEs

These are the five CVEs with the highest CVSS scores for joyplus-cms_project, sorted by severity first and recency.

All CVEs for joyplus-cms_project

SQL injection vulnerability found in Joyplus-cms v.1.6.0 allows a remote attacker to access sensitive information via the id parameter of the goodbad() function.

A vulnerability in the \inc\config.php component of joyplus-cms v1.6 allows attackers to access sensitive information.

joyplus-cms 1.6.0 allows manager/admin_pic.php?rootpath= absolute path traversal.

joyplus-cms 1.6.0 has XSS via the manager/collect/collect_vod_zhuiju.php keyword parameter.

joyplus-cms 1.6.0 has SQL Injection via the manager/admin_ajax.php val parameter.

joyplus-cms 1.6.0 has XSS via the manager/admin_ajax.php can_search_device array parameter.

manager/editor/upload.php in joyplus-cms 1.6.0 allows arbitrary file upload because detection of a prohibited file extension simply sets the $errm value, and does not otherwise alter the flow of control. Consequently, one can upload and execute a .php file, a similar issue to CVE-2018-8766.

joyplus-cms 1.6.0 has XSS in admin_player.php, related to manager/index.php "system manage" and "add" actions.

joyplus-cms 1.6.0 allows Remote Code Execution because of an Arbitrary SQL command execution issue in manager/index.php involving use of a "/!select/" substring in place of a select substring.

joyplus-cms 1.6.0 has XSS via the device_name parameter in a manager/admin_ajax.php?action=save flag=add request.

joyplus-cms 1.6.0 has XSS in manager/admin_vod.php via the keyword parameter.

joyplus-cms 1.6.0 allows remote attackers to obtain sensitive information via a direct request to the install/ or log/ URI.

CVE-2018-8767 joyplus-cms_project vulnerability CVSS: 3.5 18 Mar 2018, 06:29 UTC

joyplus-cms 1.6.0 has XSS in manager/admin_ajax.php?action=save&tab={pre}vod_type via the t_name parameter.

CVE-2018-8766 joyplus-cms_project vulnerability CVSS: 7.5 18 Mar 2018, 06:29 UTC

joyplus-cms 1.6.0 allows Remote Code Execution because of an Arbitrary File Upload issue in manager/editor/upload.php, related to manager/admin_vod.php?action=add.

CVE-2018-8717 joyplus-cms_project vulnerability CVSS: 6.8 15 Mar 2018, 01:29 UTC

joyplus-cms 1.6.0 has CSRF, as demonstrated by adding an administrator account via a manager/admin_ajax.php?action=save&tab={pre}manager request.