Vulnerabilities > Acymailing > Acymailing
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-25 | CVE-2023-41867 | Cross-site Scripting vulnerability in Acymailing Unauth. | 6.1 |
2023-08-17 | CVE-2023-39971 | Cross-site Scripting vulnerability in Acymailing 6.7.0 Improper Neutralization of Input During Web Page Generation vulnerability in AcyMailing Enterprise component for Joomla allows XSS. | 6.1 |
2023-08-17 | CVE-2023-39972 | Unspecified vulnerability in Acymailing 6.7.0 Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. | 4.3 |
2023-08-17 | CVE-2023-39973 | Unspecified vulnerability in Acymailing 6.7.0 Improper Access Control vulnerability in AcyMailing Enterprise component for Joomla. | 4.3 |
2023-08-17 | CVE-2023-39974 | Exposure of Resource to Wrong Sphere vulnerability in Acymailing 6.7.0 Exposure of Sensitive Information vulnerability in AcyMailing Enterprise component for Joomla. | 5.3 |
2023-03-30 | CVE-2023-28731 | Unrestricted Upload of File with Dangerous Type vulnerability in Acymailing AnyMailing Joomla Plugin is vulnerable to unauthenticated remote code execution, when being granted access to the campaign's creation on front-office due to unrestricted file upload allowing PHP code to be injected. | 9.8 |
2023-03-30 | CVE-2023-28732 | Path Traversal vulnerability in Acymailing Missing access control in AnyMailing Joomla Plugin allows to list and access files containing sensitive information from the plugin itself and access to system files via path traversal, when being granted access to the campaign's creation on front-office. | 7.5 |
2023-03-30 | CVE-2023-28733 | Cross-site Scripting vulnerability in Acymailing AnyMailing Joomla Plugin is vulnerable to stored cross site scripting (XSS) in templates and emails of AcyMailing, exploitable without authentication when access is granted to the campaign's creation on front-office. | 6.1 |
2021-05-17 | CVE-2021-24288 | Open Redirect vulnerability in Acymailing When subscribing using AcyMailing, the 'redirect' parameter isn't properly sanitized. | 5.8 |