Filtered by vendor Icegram Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2019-19984 1 Icegram 1 Email Subscribers \& Newsletters 2020-08-24 6.3 Medium
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed users with edit_post capabilities to manage plugin settings and email campaigns.
CVE-2019-19981 1 Icegram 1 Email Subscribers \& Newsletters 2020-08-24 5.4 Medium
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for CSRF to be exploited on all plugin settings.
CVE-2020-5768 1 Icegram 1 Email Subscribers \& Newsletters 2020-07-21 4.9 Medium
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote, authenticated attacker to determine the value of database fields.
CVE-2020-5767 1 Icegram 1 Email Subscribers \& Newsletters 2020-07-21 6.5 Medium
Cross-site request forgery in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote attacker to send forged emails by tricking legitimate users into clicking a crafted link.
CVE-2019-19982 1 Icegram 1 Email Subscribers \& Newsletters 2019-12-30 5.3 Medium
The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed for unauthenticated option creation. In order to exploit this vulnerability, an attacker would need to send a /wp-admin/admin-post.php?es_skip=1&option_name= request.
CVE-2019-13569 1 Icegram 1 Email Subscribers \& Newsletters 2019-07-31 N/A
A SQL injection vulnerability exists in the Icegram Email Subscribers & Newsletters plugin through 4.1.7 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system.
CVE-2018-6015 1 Icegram 1 Email Subscribers \& Newsletters 2018-02-12 N/A
An issue was discovered in the "Email Subscribers & Newsletters" plugin before 3.4.8 for WordPress. Sending an HTTP POST request to a URI with /?es=export at the end, and adding option=view_all_subscribers in the body, allows downloading of a CSV data file with all subscriber data.