Filtered by vendor Zend Subscriptions
Filtered by product Zendto Subscriptions
Total 8 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2013-6808 1 Zend 1 Zendto 2025-04-11 N/A
Cross-site scripting (XSS) vulnerability in lib/NSSDropoff.php in ZendTo before 4.11-13 allows remote attackers to inject arbitrary web script or HTML via a modified emailAddr field to pickup.php.
CVE-2025-32352 1 Zend 1 Zendto 2025-04-07 4.8 Medium
A type confusion vulnerability in lib/NSSAuthenticator.php in ZendTo before v5.04-7 allows remote attackers to bypass authentication for users with passwords stored as MD5 hashes that can be interpreted as numbers. A solution requires moving from MD5 to bcrypt.
CVE-2021-47667 1 Zend 1 Zendto 2025-04-07 10 Critical
An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
CVE-2021-27888 1 Zend 1 Zendto 2024-11-21 6.1 Medium
ZendTo before 6.06-4 Beta allows XSS during the display of a drop-off in which a filename has unexpected characters.
CVE-2020-8986 1 Zend 1 Zendto 2024-11-21 9.8 Critical
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests.
CVE-2020-8985 1 Zend 1 Zendto 2024-11-21 8.8 High
ZendTo prior to 5.22-2 Beta allowed reflected XSS and CSRF via the unlock.tpl unlock user functionality.
CVE-2020-8984 1 Zend 1 Zendto 2024-11-21 7.5 High
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta allowed IP address spoofing via the X-Forwarded-For header.
CVE-2018-1000841 1 Zend 1 Zendto 2024-11-21 N/A
Zend.To version Prior to 5.15-1 contains a Cross Site Scripting (XSS) vulnerability in The verify.php page that can result in An attacker could execute arbitrary Javascript code in the context of the victim's browser.. This attack appear to be exploitable via HTTP POST request. This vulnerability appears to have been fixed in 5.16-1 Beta.