JNews Joomla Component before 8.5.0 has XSS via the mailingsearch parameter.
Max CVSS
4.8
EPSS Score
0.06%
Published
2020-03-09
Updated
2020-03-10
JNews Joomla Component before 8.5.0 allows SQL injection via upload thumbnail, Queue Search Field, Subscribers Search Field, or Newsletters Search Field.
Max CVSS
7.2
EPSS Score
0.09%
Published
2020-03-09
Updated
2020-03-10
JNews Joomla Component before 8.5.0 allows arbitrary File Upload via Subscribers or Templates, as demonstrated by the .php5 extension.
Max CVSS
8.8
EPSS Score
0.11%
Published
2020-03-09
Updated
2020-03-10
Cross-site scripting (XSS) vulnerability in open-flash-chart.swf in Open Flash Chart (aka Open-Flash Chart), as used in the Pretty Link Lite plugin before 1.6.3 for WordPress, JNews (com_jnews) component 8.0.1 for Joomla!, and CiviCRM 3.1.0 through 4.2.9 and 4.3.0 through 4.3.3, allows remote attackers to inject arbitrary web script or HTML via the get-data parameter.
Max CVSS
4.3
EPSS Score
1.22%
Published
2014-03-12
Updated
2017-08-29
The jNews (com_jnews) component 7.5.1 for Joomla! allows remote attackers to obtain sensitive information via the emailsearch parameter, which reveals the installation path in an error message.
Max CVSS
5.0
EPSS Score
0.33%
Published
2012-08-13
Updated
2017-08-29
Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
Max CVSS
10.0
EPSS Score
7.07%
Published
2012-11-26
Updated
2012-11-27
SQL injection vulnerability in the Joobi Acajoom (com_acajoom) 1.1.5 and 1.2.5 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mailingid parameter in a mailing view action to index.php.
Max CVSS
7.5
EPSS Score
0.11%
Published
2008-03-20
Updated
2017-09-29
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!