Show filters
128 Total Results
Displaying 61-70 of 128
Sort by:
Attacker Value
Unknown
CVE-2022-31856
Disclosure Date: July 05, 2022 (last updated February 24, 2025)
Newsletter Module v3.x was discovered to contain a SQL injection vulnerability via the zemez_newsletter_email parameter at /index.php.
0
Attacker Value
Unknown
CVE-2022-1889
Disclosure Date: June 20, 2022 (last updated February 23, 2025)
The Newsletter WordPress plugin before 7.4.6 does not escape and sanitise the preheader_text setting, which could allow high privilege users to perform Stored Cross-Site Scripting attacks when the unfilteredhtml is disallowed
0
Attacker Value
Unknown
CVE-2022-1756
Disclosure Date: June 13, 2022 (last updated February 23, 2025)
The Newsletter WordPress plugin before 7.4.5 does not sanitize and escape the $_SERVER['REQUEST_URI'] before echoing it back in admin pages. Although this uses addslashes, and most modern browsers automatically URLEncode requests, this is still vulnerable to Reflected XSS in older browsers such as Internet Explorer 9 or below.
0
Attacker Value
Unknown
CVE-2022-21179
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
Cross-site request forgery (CSRF) vulnerability in EC-CUBE plugin 'Mail Magazine Management Plugin' ver4.0.0 to 4.1.1 (for EC-CUBE 4 series) and ver1.0.0 to 1.0.4 (for EC-CUBE 3 series) allows a remote unauthenticated attacker to hijack the authentication of an administrator via a specially crafted page, and Mail Magazine Templates and/or transmitted history information may be deleted unintendedly.
0
Attacker Value
Unknown
CVE-2021-24874
Disclosure Date: February 14, 2022 (last updated February 23, 2025)
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.31 does not escape the lang and pid parameter before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
0
Attacker Value
Unknown
CVE-2021-24923
Disclosure Date: January 24, 2022 (last updated February 23, 2025)
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.25 does not escape the sib-statistics-date parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue
0
Attacker Value
Unknown
CVE-2021-38302
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The Newsletter extension through 4.0.0 for TYPO3 allows SQL Injection.
0
Attacker Value
Unknown
CVE-2021-34658
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The Simple Popup Newsletter WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/simple-popup-newsletter.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4.7.
0
Attacker Value
Unknown
CVE-2020-35933
Disclosure Date: January 01, 2021 (last updated February 22, 2025)
A Reflected Authenticated Cross-Site Scripting (XSS) vulnerability in the Newsletter plugin before 6.8.2 for WordPress allows remote attackers to trick a victim into submitting a tnpc_render AJAX request containing either JavaScript in an options parameter, or a base64-encoded JSON string containing JavaScript in the encoded_options parameter.
0
Attacker Value
Unknown
CVE-2020-35932
Disclosure Date: January 01, 2021 (last updated February 22, 2025)
Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes.
0