CVE-2021-38302
https://notcve.org/view.php?id=CVE-2021-38302
The Newsletter extension through 4.0.0 for TYPO3 allows SQL Injection. La extensión Newsletter versiones hasta 4.0.0 para TYPO3, permite una inyección SQL. • https://typo3.org/help/security-advisories https://typo3.org/security/advisory/typo3-ext-sa-2021-014 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2017-18522 – EELV Newsletter < 4.6.1 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2017-18522
The eelv-newsletter plugin before 4.6.1 for WordPress has XSS in the address book. El plugin de boletín de noticias de eelv antes de 4.6.1 para WordPress tiene XSS en la libreta de direcciones. • https://wordpress.org/plugins/eelv-newsletter/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2017-18523 – EELV Newsletter <= 4.6.0 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2017-18523
The eelv-newsletter plugin before 4.6.1 for WordPress has CSRF in the address book. El plugin de boletín de noticias de eelv antes de 4.6.1 para WordPress tiene CSRF en la libreta de direcciones. The EELV Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.6.0. This is due to missing or incorrect nonce validation in the 'eelv-newsletter/trunk/lettreinfo.php' file. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wordpress.org/plugins/eelv-newsletter/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2015-9334 – Email Newsletter <= 20.15 - Unauthenticated SQL Injection
https://notcve.org/view.php?id=CVE-2015-9334
The email-newsletter plugin through 20.15 for WordPress has SQL injection. El plugin de boletín de correo electrónico hasta 20.15 para WordPress tiene inyección SQL The Email Newsletter plugin for WordPress is vulnerable to generic SQL Injection in versions up to, and including, 20.15 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wordpress.org/plugins/email-newsletter/#developers https://wordpress.org/plugins/email-newsletter/advanced https://wordpress.org/support/topic/susceptible-to-sql-injection-attack • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2014-4939 – ENL Newsletter <= 1.0.1 - Authenticated (Admin+) SQL Injection
https://notcve.org/view.php?id=CVE-2014-4939
SQL injection vulnerability in the ENL Newsletter (enl-newsletter) plugin 1.0.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in the enl-add-new page to wp-admin/admin.php. Vulnerabilidad de inyección SQL en el plugin ENL Newsletter (enl-newsletter) 1.0.1 para WordPress permite a administradores remotos autenticados ejecutar comandos SQL arbitrarios a través del parámetro id en la página enl-add-new en wp-admin/admin.php. • https://www.exploit-db.com/exploits/39253 http://codevigilant.com/disclosure/wp-plugin-enl-newsletter-a1-injection • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •