According to its self-reported version, the instance of Joomla! running on the remote web server is 1.7.x prior to 3.9.23. It is, therefore, affected by multiple vulnerabilities. - The autosuggestion feature of com_finder did not respect the access level of the corresponding terms. - The globlal configuration page does not remove secrets from the HTML output, disclosing the current values. - The folder parameter of mod_random_image lacked input validation, leading to a path traversal vulnerability. - Improper filter blacklist configuration leads to a SQL injection vulnerability in the backend user list. - Improper handling of the username leads to a user enumeration attack vector in the backend login page. - A missing token check in the emailexport feature of com_privacy causes a CSRF vulnerability. - Lack of input validation while handling ACL rulesets can cause write ACL violations. Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.