@ 2020-01-04T00:07:26Z <?php
$html = '<ul class="newsfeed">
<li>
<span class="feed-link">
<a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/GIZJHbqr1wQ/797-20191202-core-various-sql-injections-through-configuration-parameters.html" target="_blank">
[20191202] - Core - Various SQL injections through configuration parameters</a></span>
<div class="feed-item-date">
16 December 2019 </div>
<div class="feed-item-description">
<ul>
<li><strong>Project:</strong> Joomla!</li>
<li><strong>SubProject:</strong> CMS</li>
<li><strong>Impact:</strong> <span class="label label-danger">High</span></li>
<li><strong>Severity:</strong> <span class="label label-info">Low</span></li>
<li><strong>Versions:</strong> 2.5.0 - 3.9.13</li>
<li><strong>Exploit type:</strong> SQL injection</li>
<li><strong>Reported Date:</strong> 2019-December-01</li>
<li><strong>Fixed Date:</strong> 2019-December-17</li>
<li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19846">CVE-2019-19846</a></li>
</ul>
<h3>Description</h3>
<p>The lack of validation of configuration parameters used in SQL queries caused various SQL injection vectors.</p>
<h3>Affected Installs</h3>
<p>Joomla! CMS versions 2.5.0 - 3.9.13</p>
<h3>Solution</h3>
<p>Upgrade to version 3.9.14</p>
<h3>Contact</h3>
<p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p>
<div class="alert alert-info"><strong>Reported By: </strong>ka1n4t</div><div class="feedflare">
<a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=GIZJHbqr1wQ:mKZamezlv3g:yIl2AUoC8zA"></a>
</div> </div>
</li>
<li>
<span class="feed-link">
<a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/_fWsZ57Sw7g/796-20191201-core-path-disclosure-in-framework-files.html" target="_blank">
[20191201] - Core - Path Disclosure in framework files</a></span>
<div class="feed-item-date">
16 December 2019 </div>
<div class="feed-item-description">
<ul>
<li><strong>Project:</strong> Joomla!</li>
<li><strong>SubProject:</strong> CMS</li>
<li><strong>Impact:</strong> Low</li>
<li><strong>Severity:</strong> <span class="label label-info">Low</span></li>
<li><strong>Versions:</strong> 3.8.0 - 3.9.13</li>
<li><strong>Exploit type:</strong> Path Disclosure</li>
<li><strong>Reported Date:</strong> 2019-November-22</li>
<li><strong>Fixed Date:</strong> 2019-December-17</li>
<li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19845">CVE-2019-19845</a></li>
</ul>
<h3>Description</h3>
<p>Missing access check in framework files could lead to a path disclosure.</p>
<h3>Affected Installs</h3>
<p>Joomla! CMS versions 3.8.0 - 3.9.13</p>
<h3>Solution</h3>
<p>Upgrade to version 3.9.14</p>
<h3>Contact</h3>
<p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p>
<div class="alert alert-info"><strong>Reported By: </strong>Lee Thao, Viettel Cyber Security</div><div class="feedflare">
<a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=_fWsZ57Sw7g:uVTwWaDiNQ0:yIl2AUoC8zA"></a>
</div> </div>
</li>
<li>
<span class="feed-link">
<a href="https://feeds.joomla.org/~r/JoomlaSecurityNews/~3/Zi-lVuM4KoY/795-20191002-core-path-disclosure-in-phpuft8-mapping-files.html" target="_blank">
[20191002] - Core - Path Disclosure in phpuft8 mapping files</a></span>
<div class="feed-item-date">
05 November 2019 </div>
<div class="feed-item-description">
<ul>
<li><strong>Project:</strong> Joomla!</li>
<li><strong>SubProject:</strong> CMS</li>
<li><strong>Impact:</strong> Low</li>
<li><strong>Severity:</strong> <span class="label label-info">Low</span></li>
<li><strong>Versions:</strong> 3.6.0 - 3.9.12</li>
<li><strong>Exploit type:</strong> Path Disclosure</li>
<li><strong>Reported Date:</strong> 2019-November-01</li>
<li><strong>Fixed Date:</strong> 2019-November-05</li>
<li><strong>CVE Number:</strong> <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18674">CVE-2019-18674</a></li>
</ul>
<h3>Description</h3>
<p>Missing access check in the phputf8 mapping files could lead to an path disclosure.</p>
<h3>Affected Installs</h3>
<p>Joomla! CMS versions 3.6.0 - 3.9.12</p>
<h3>Solution</h3>
<p>Upgrade to version 3.9.13</p>
<h3>Contact</h3>
<p>The JSST at the <a title="Contact the JSST" href="https://developer.joomla.org/security-centre.html">Joomla! Security Centre</a>.</p>
<div class="alert alert-info"><strong>Reported By: </strong>Phil Taylor</div><div class="feedflare">
<a href="https://feeds.joomla.org/~ff/JoomlaSecurityNews?a=Zi-lVuM4KoY:eFsJw4QiCW0:yIl2AUoC8zA"></a>
</div> </div>
</li>
</ul>';
$doc = new DOMDocument();
$doc->loadHTML($html);
$xpath = new DOMXPath($doc);
$feed_items = $xpath->query('//div[contains(@class, "feed-item-description")]');
foreach ($feed_items as $feed_item) {
$impact_node = $xpath->query('*/li[contains(string(), "Impact:")]', $feed_item);
$impact = preg_replace('/Impact:\W*/', '', $impact_node->item(0)->textContent);
echo "Impact: " . $impact . "\n";
$severity_node = $xpath->query('*/li[contains(string(), "Severity:")]', $feed_item);
$severity = preg_replace('/Severity:\W*/u', '', $severity_node->item(0)->textContent);
echo "Severity: " . $severity . "\n";
}
Enable javascript to submit You have javascript disabled. You will not be able to edit any code.
Here you find the average performance (time & memory) of each version. A grayed out version indicates it didn't complete successfully (based on exit-code).
Version System time (s) User time (s) Memory (MiB) 8.3.6 0.011 0.007 18.93 8.3.5 0.013 0.010 16.92 8.3.4 0.006 0.013 19.48 8.3.3 0.011 0.004 19.18 8.3.2 0.003 0.005 21.25 8.3.1 0.008 0.000 22.45 8.3.0 0.000 0.008 22.45 8.2.18 0.007 0.011 25.92 8.2.17 0.013 0.003 19.55 8.2.16 0.011 0.004 22.96 8.2.15 0.000 0.009 24.18 8.2.14 0.006 0.003 24.66 8.2.13 0.003 0.005 26.16 8.2.12 0.004 0.004 26.16 8.2.11 0.016 0.003 21.37 8.2.10 0.013 0.000 18.53 8.2.9 0.003 0.006 18.50 8.2.8 0.000 0.008 19.33 8.2.7 0.006 0.003 18.43 8.2.6 0.008 0.000 18.40 8.2.5 0.000 0.008 18.10 8.2.4 0.008 0.000 21.52 8.2.3 0.006 0.003 19.84 8.2.2 0.003 0.005 18.52 8.2.1 0.003 0.005 19.72 8.2.0 0.003 0.005 19.79 8.1.28 0.013 0.003 25.92 8.1.27 0.005 0.005 21.16 8.1.26 0.000 0.008 26.35 8.1.25 0.005 0.003 28.09 8.1.24 0.008 0.003 21.74 8.1.23 0.007 0.004 18.20 8.1.22 0.000 0.008 18.16 8.1.21 0.006 0.003 18.77 8.1.20 0.003 0.007 17.97 8.1.19 0.006 0.003 17.73 8.1.18 0.003 0.006 19.39 8.1.17 0.007 0.003 19.30 8.1.16 0.000 0.008 19.45 8.1.15 0.004 0.004 19.51 8.1.14 0.003 0.006 21.22 8.1.13 0.007 0.000 20.65 8.1.12 0.000 0.007 18.07 8.1.11 0.004 0.004 17.91 8.1.10 0.004 0.004 17.92 8.1.9 0.000 0.008 18.00 8.1.8 0.005 0.003 17.89 8.1.7 0.006 0.003 18.06 8.1.6 0.003 0.007 18.19 8.1.5 0.006 0.006 18.10 8.1.4 0.004 0.004 18.11 8.1.3 0.003 0.006 18.26 8.1.2 0.006 0.009 18.20 8.1.1 0.003 0.006 17.99 8.1.0 0.004 0.004 18.14 8.0.30 0.004 0.004 18.77 8.0.29 0.000 0.009 17.25 8.0.28 0.000 0.007 18.89 8.0.27 0.004 0.004 17.42 8.0.26 0.003 0.003 20.40 8.0.25 0.007 0.000 17.59 8.0.24 0.000 0.008 17.57 8.0.23 0.004 0.004 17.49 8.0.22 0.004 0.004 17.46 8.0.21 0.004 0.004 17.63 8.0.20 0.004 0.004 17.49 8.0.19 0.007 0.000 17.61 8.0.18 0.003 0.006 17.59 8.0.17 0.005 0.005 17.43 8.0.16 0.006 0.003 17.43 8.0.15 0.003 0.005 17.47 8.0.14 0.007 0.004 17.51 8.0.13 0.006 0.000 13.96 8.0.12 0.006 0.003 17.61 8.0.11 0.005 0.003 17.51 8.0.10 0.000 0.009 17.55 8.0.9 0.000 0.009 17.41 8.0.8 0.007 0.009 17.62 8.0.7 0.003 0.006 17.44 8.0.6 0.003 0.006 17.66 8.0.5 0.000 0.008 17.46 8.0.3 0.011 0.007 17.53 8.0.2 0.011 0.008 17.68 8.0.1 0.004 0.004 17.57 8.0.0 0.016 0.003 17.33 7.4.33 0.000 0.005 17.22 7.4.32 0.003 0.003 17.22 7.4.30 0.003 0.003 17.20 7.4.29 0.008 0.000 17.10 7.4.28 0.003 0.007 17.17 7.4.27 0.000 0.007 17.07 7.4.26 0.006 0.000 13.95 7.4.25 0.000 0.007 17.21 7.4.24 0.005 0.003 17.15 7.4.23 0.002 0.005 17.32 7.4.22 0.002 0.005 17.31 7.4.21 0.009 0.009 17.29 7.4.20 0.004 0.004 17.36 7.4.13 0.010 0.009 17.03 7.4.12 0.012 0.015 17.21 7.4.11 0.010 0.007 17.17 7.4.10 0.008 0.013 17.15 7.4.9 0.011 0.008 17.07 7.4.8 0.010 0.006 19.39 7.4.7 0.012 0.006 17.16 7.4.6 0.009 0.015 17.09 7.4.5 0.004 0.011 17.29 7.4.4 0.010 0.006 17.09 7.4.1 0.012 0.007 16.17 7.4.0 0.007 0.011 16.27 7.3.33 0.000 0.008 16.68 7.3.32 0.000 0.008 13.58 7.3.31 0.008 0.000 16.93 7.3.30 0.000 0.008 16.88 7.3.29 0.005 0.011 16.82 7.3.28 0.010 0.011 16.91 7.3.26 0.009 0.009 17.18 7.3.24 0.011 0.009 16.99 7.3.23 0.009 0.009 17.23 7.3.21 0.009 0.009 16.96 7.3.20 0.011 0.006 16.83 7.3.19 0.014 0.007 16.91 7.3.18 0.012 0.006 16.98 7.3.17 0.009 0.013 17.08 7.3.16 0.003 0.014 17.01 7.3.13 0.006 0.010 16.01 7.3.12 0.008 0.011 16.16 7.3.11 0.011 0.008 16.02 7.3.10 0.016 0.003 16.32 7.3.9 0.007 0.014 16.26 7.3.8 0.015 0.006 16.22 7.3.7 0.007 0.016 16.04 7.3.6 0.008 0.013 16.09 7.3.5 0.010 0.011 16.10 7.3.4 0.011 0.010 16.02 7.3.3 0.012 0.009 16.09 7.3.2 0.010 0.013 16.07 7.3.1 0.013 0.011 16.18 7.3.0 0.010 0.011 15.91 7.2.33 0.010 0.010 17.18 7.2.32 0.006 0.012 17.42 7.2.31 0.011 0.008 17.07 7.2.30 0.006 0.016 17.32 7.2.29 0.004 0.014 17.34 7.2.26 0.010 0.010 16.24 7.2.25 0.009 0.011 16.19 7.2.24 0.013 0.006 16.30 7.2.23 0.009 0.011 16.32 7.2.22 0.007 0.015 16.42 7.2.21 0.011 0.010 16.45 7.2.20 0.015 0.007 16.29 7.2.19 0.014 0.008 16.37 7.2.18 0.009 0.014 16.37 7.2.17 0.013 0.010 16.31 7.2.16 0.014 0.006 16.13 7.2.15 0.008 0.014 16.41 7.2.14 0.015 0.009 16.56 7.2.13 0.013 0.011 16.41 7.2.12 0.014 0.010 16.37 7.2.11 0.011 0.015 16.30 7.2.10 0.013 0.013 16.26 7.2.9 0.011 0.010 16.39 7.2.8 0.010 0.013 16.43 7.2.7 0.014 0.010 16.47 7.2.6 0.013 0.011 16.53 7.2.5 0.012 0.011 16.26 7.2.4 0.016 0.012 16.41 7.2.3 0.015 0.009 16.42 7.2.2 0.012 0.013 16.43 7.2.1 0.017 0.009 16.38 7.2.0 0.009 0.011 16.42
preferences:dark mode live preview
60.51 ms | 401 KiB | 5 Q