CVSS Base Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Detection Type: Remote Banner
Solution Type: Vendor Patch
Summary: The WordPress plugin Easy Forms for Mailchimp is prone to a code injection vulnerability.
Detection Method: Checks if a vulnerable version is present on the target host.
Technical Details: The vulnerability is exploitable via the admin input field.
Impact: Successful exploitation would allow an attacker to
execute arbitrary code on the target machine.
Affected Versions: WordPress Easy Forms for Mailchimp plugin through version 6.5.2.
Recommendations: Update to version 6.5.3 or later.
Web application abuses
Mageni can help you to find out if you have this or more vulnerabilities exposing you to hackers, ransomware and malware: Download Mageni's Free Edition
Debian Security Advisory DSA 4545-1 (mediawiki - security update)
Debian LTS Advisory ([SECURITY] [DLA 1966-1] aspell security update)
Debian LTS Advisory ([SECURITY] [DLA 1965-1] nfs-utils security update)
Apache HTTP Server Memory Access Vulnerability (Windows)
Apache HTTP Server Memory Access Vulnerability (Linux)
Apache HTTP Server Multiple Vulnerabilities (Windows)
Apache HTTP Server Multiple Vulnerabilities (Linux)
Apache HTTP Server Stack Overflow Vulnerability (Windows)
Apache HTTP Server Stack Overflow Vulnerability (Linux)
Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.