Multiple cross-site scripting (XSS) vulnerabilities in the Newsletter Manager plugin before 1.0.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) xyz_em_campName to admin/create_campaign.php or (2) admin/edit_campaign.php, (3) xyz_em_email parameter to admin/edit_email.php, (4) xyz_em_exportbatchSize parameter to import_export.php, or (5) pagination limit in the Newsletter Manager options.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.org/files/112694/WordPress-Newsletter-Manager-1.0-Cross-Site-Scripting.html | Exploit | 
| http://secunia.com/advisories/49183 | Vendor Advisory | 
| https://plugins.trac.wordpress.org/changeset/533904 | Exploit Patch | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2014-01-16 21:55
Updated : 2014-01-17 18:50
NVD link : CVE-2012-6628
Mitre link : CVE-2012-6628
CVE.ORG link : CVE-2012-6628
JSON object : View
Products Affected
                xyzscripts
- newsletter_manager
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
