漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
arnoldle submitByMailPlugin edit_list.php cross-site request forgery
漏洞信息
A vulnerability was found in arnoldle submitByMailPlugin 1.0b2.9 and classified as problematic. This issue affects some unknown processing of the file edit_list.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.0b2.9a is able to address this issue. The patch is named a739f680a1623d22f52ff1371e86ca472e63756f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-221495.
漏洞信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
漏洞
跨站请求伪造(CSRF)
漏洞
phplist-plugin-submitByMailPlugin 跨站请求伪造漏洞
漏洞信息
phplist-plugin-submitByMailPlugin是arnoldle个人开发者的一个通过邮件向 Phplist 提交消息的插件元素。 phplist-plugin-submitByMailPlugin 1.0b2.9版本存在跨站请求伪造漏洞,该漏洞源于文件edit_list.php的某些未知处理存在问题,会导致跨站请求伪造漏洞。
漏洞信息
N/A
漏洞
N/A