Page 2 of 39 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in PHPList 3.2.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Subscription. The manipulation leads to sql injection. The attack may be launched remotely. • http://seclists.org/fulldisclosure/2017/Mar/45 https://vuldb.com/?id.98918 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in PHPList 3.2.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument sortby with the input password leads to information disclosure. The attack can be launched remotely. • http://seclists.org/fulldisclosure/2017/Mar/45 https://vuldb.com/?id.98917 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in PHPList 3.2.6. It has been classified as critical. Affected is an unknown function of the file /lists/admin/ of the component Sending Campain. The manipulation leads to sql injection. It is possible to launch the attack remotely. • http://seclists.org/fulldisclosure/2017/Mar/45 https://vuldb.com/?id.98916 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability was found in PHPList 3.2.6 and classified as critical. This issue affects some unknown processing of the file /lists/index.php of the component Edit Subscription. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • http://seclists.org/fulldisclosure/2017/Mar/45 https://vuldb.com/?id.98915 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code execution Una vulnerabilidad de ejecución de código remota en phplist versión 3.5.1. La aplicación no comprueba las extensiones de archivo almacenadas en el archivo zip del plugin, la carga de un plugin malicioso que contenga archivos php con extensiones como PHP, phtml, php7 serán copiadas en el directorio de plugins lo que conllevaría a una ejecución de código remota • https://drive.google.com/open?id=1znDU4fDKA_seg16mJLLtgaaFfvmf-mS6 • CWE-434: Unrestricted Upload of File with Dangerous Type •