Show filters
76 Total Results
Displaying 21-30 of 76
Sort by:
Attacker Value
Unknown

CVE-2023-38190

Disclosure Date: October 21, 2023 (last updated October 28, 2023)
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
Attacker Value
Unknown

CVE-2023-38191

Disclosure Date: October 20, 2023 (last updated October 28, 2023)
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.
Attacker Value
Unknown

CVE-2023-3179

Disclosure Date: July 17, 2023 (last updated October 08, 2023)
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
Attacker Value
Unknown

CVE-2021-4422

Disclosure Date: July 12, 2023 (last updated October 08, 2023)
The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2023-3082

Disclosure Date: July 12, 2023 (last updated October 08, 2023)
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2022-33201

Disclosure Date: August 01, 2022 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in MailerLite – Signup forms (official) plugin <= 1.5.7 at WordPress allows an attacker to change the API key.
Attacker Value
Unknown

CVE-2022-1604

Disclosure Date: June 13, 2022 (last updated October 07, 2023)
The MailerLite WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2022-20614

Disclosure Date: January 12, 2022 (last updated October 25, 2023)
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Attacker Value
Unknown

CVE-2022-20613

Disclosure Date: January 12, 2022 (last updated October 25, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Attacker Value
Unknown

CVE-2021-23400

Disclosure Date: June 29, 2021 (last updated November 28, 2024)
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.