Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phplist phplist 2.8.12 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-5322
Multiple SQL injection vulnerabilities in phplist prior to 2.10.3 allow remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Tincan Phplist 2.9.4
Tincan Phplist 2.9.3
Tincan Phplist 2.8.12
Tincan Phplist 2.9.5
Tincan Phplist 2.10.1
Tincan Phplist
NA
CVE-2006-5294
Cross-site scripting (XSS) vulnerability in index.php in phplist prior to 2.10.3 allows remote malicious users to inject arbitrary web script or HTML via the unsubscribeemail parameter.
Tincan Phplist 2.6.3
Tincan Phplist 2.6
Tincan Phplist 2.8.12
Tincan Phplist 2.6.2
Tincan Phplist 2.6.4
Tincan Phplist 2.10.1
Tincan Phplist 2.6.1
Tincan Phplist
1 EDB exploit
NA
CVE-2006-1746
Directory traversal vulnerability in PHPList 2.10.2 and previous versions allows remote malicious users to include arbitrary local files via the (1) GLOBALS[database_module] or (2) GLOBALS[language_module] parameters, which overwrite the underlying $GLOBALS variable.
Tincan Phplist 2.8.2
Tincan Phplist 2.6.3
Tincan Phplist 2.6.5
Tincan Phplist 2.6
Tincan Phplist 2.8.12
Tincan Phplist 2.6.2
Tincan Phplist 2.6.4
Tincan Phplist 2.8.7
Tincan Phplist 2.10.1
Tincan Phplist 2.6.1
Tincan Phplist
Tincan Phplist 2.7.1
Tincan Phplist 2.7.2
NA
CVE-2005-2432
SQL injection vulnerability in PhpList allows remote malicious users to modify SQL statements via the id argument to admin pages such as (1) members or (2) admin.
Tincan Phplist
1 EDB exploit
NA
CVE-2004-2744
Unspecified vulnerability in Tincan Limited PHPlist prior to 2.8.12 has unknown impact and attack vectors, related to a "security update release."
Phplist Mailing List Manager
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege
CVE-2022-48762
CVE-2022-48751
CVE-2024-37079
CVE-2024-30848
LFI
man-in-the-middle
CVE-2022-48736
CVE-2024-30103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2