Page 5 of 29 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The Newsletter extension through 4.0.0 for TYPO3 allows SQL Injection. La extensión Newsletter versiones hasta 4.0.0 para TYPO3, permite una inyección SQL. • https://typo3.org/help/security-advisories https://typo3.org/security/advisory/typo3-ext-sa-2021-014 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The eelv-newsletter plugin before 4.6.1 for WordPress has XSS in the address book. El plugin de boletín de noticias de eelv antes de 4.6.1 para WordPress tiene XSS en la libreta de direcciones. • https://wordpress.org/plugins/eelv-newsletter/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The eelv-newsletter plugin before 4.6.1 for WordPress has CSRF in the address book. El plugin de boletín de noticias de eelv antes de 4.6.1 para WordPress tiene CSRF en la libreta de direcciones. The EELV Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.6.0. This is due to missing or incorrect nonce validation in the 'eelv-newsletter/trunk/lettreinfo.php' file. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wordpress.org/plugins/eelv-newsletter/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The email-newsletter plugin through 20.15 for WordPress has SQL injection. El plugin de boletín de correo electrónico hasta 20.15 para WordPress tiene inyección SQL The Email Newsletter plugin for WordPress is vulnerable to generic SQL Injection in versions up to, and including, 20.15 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wordpress.org/plugins/email-newsletter/#developers https://wordpress.org/plugins/email-newsletter/advanced https://wordpress.org/support/topic/susceptible-to-sql-injection-attack • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

SQL injection vulnerability in the ENL Newsletter (enl-newsletter) plugin 1.0.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in the enl-add-new page to wp-admin/admin.php. Vulnerabilidad de inyección SQL en el plugin ENL Newsletter (enl-newsletter) 1.0.1 para WordPress permite a administradores remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro id en la página enl-add-new en wp-admin/admin.php. • https://www.exploit-db.com/exploits/39253 http://codevigilant.com/disclosure/wp-plugin-enl-newsletter-a1-injection • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •