Show filters
193 Total Results
Displaying 71-80 of 193
Sort by:
Attacker Value
Unknown
CVE-2023-5108
Disclosure Date: December 04, 2023 (last updated December 08, 2023)
The Easy Newsletter Signups WordPress plugin through 1.0.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
0
Attacker Value
Unknown
CVE-2023-47686
Disclosure Date: November 16, 2023 (last updated November 23, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Kiboko Labs Arigato Autoresponder and Newsletter plugin <= 2.7.2.2 versions.
0
Attacker Value
Unknown
CVE-2023-47308
Disclosure Date: November 15, 2023 (last updated November 22, 2023)
In the module "Newsletter Popup PRO with Voucher/Coupon code" (newsletterpop) before version 2.6.1 from Active Design for PrestaShop, a guest can perform SQL injection in affected versions. The method `NewsletterpopsendVerificationModuleFrontController::checkEmailSubscription()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
0
Attacker Value
Unknown
CVE-2023-30478
Disclosure Date: November 10, 2023 (last updated November 16, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters plugin <= 4.8.8 versions.
0
Attacker Value
Unknown
CVE-2023-45829
Disclosure Date: October 25, 2023 (last updated October 28, 2023)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in HappyBox Newsletter & Bulk Email Sender – Email Newsletter Plugin for WordPress plugin <= 2.0.1 versions.
0
Attacker Value
Unknown
CVE-2023-39676
Disclosure Date: September 08, 2023 (last updated October 08, 2023)
FieldPopupNewsletter Prestashop Module v1.0.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the callback parameter at ajax.php.
0
Attacker Value
Unknown
CVE-2023-4772
Disclosure Date: September 07, 2023 (last updated October 08, 2023)
The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'newsletter_form' shortcode in versions up to, and including, 7.8.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2023-3540
Disclosure Date: July 07, 2023 (last updated October 08, 2023)
A vulnerability, which was classified as problematic, was found in SimplePHPscripts NewsLetter Script PHP 2.4. Affected is an unknown function of the file /preview.php of the component URL Parameter Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-233292.
0
Attacker Value
Unknown
CVE-2020-36727
Disclosure Date: June 07, 2023 (last updated October 08, 2023)
The Newsletter Manager plugin for WordPress is vulnerable to insecure deserialization in versions up to, and including, 1.5.1. This is due to unsanitized input from the 'customFieldsDetails' parameter being passed through a deserialization function. This potentially makes it possible for unauthenticated attackers to inject a serialized PHP object.
0
Attacker Value
Unknown
CVE-2023-2472
Disclosure Date: June 05, 2023 (last updated October 17, 2024)
The Newsletter, SMTP, Email marketing and Subscribe forms by Sendinblue WordPress plugin before 3.1.61 does not sanitise and escape a parameter before outputting it back in the admin dashboard when the WPML plugin is also active and configured, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
0