Show filters
76 Total Results
Displaying 21-30 of 76
Sort by:
Attacker Value
Unknown
CVE-2023-38190
Disclosure Date: October 21, 2023 (last updated October 28, 2023)
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows Export SQL Injection via the size parameter.
0
Attacker Value
Unknown
CVE-2023-38191
Disclosure Date: October 20, 2023 (last updated October 28, 2023)
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows spamtest_external.php XSS via a crafted filename.
0
Attacker Value
Unknown
CVE-2023-3179
Disclosure Date: July 17, 2023 (last updated October 08, 2023)
The POST SMTP Mailer WordPress plugin before 2.5.7 does not have proper CSRF checks in some AJAX actions, which could allow attackers to make logged in users with the manage_postman_smtp capability resend an email to an arbitrary address (for example a password reset email could be resent to an attacker controlled email, and allow them to take over an account).
0
Attacker Value
Unknown
CVE-2021-4422
Disclosure Date: July 12, 2023 (last updated October 08, 2023)
The POST SMTP Mailer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.20. This is due to missing or incorrect nonce validation on the handleCsvExport() function. This makes it possible for unauthenticated attackers to trigger a CSV export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2023-3082
Disclosure Date: July 12, 2023 (last updated October 08, 2023)
The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.5.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown
CVE-2022-33201
Disclosure Date: August 01, 2022 (last updated October 08, 2023)
Cross-Site Request Forgery (CSRF) vulnerability in MailerLite – Signup forms (official) plugin <= 1.5.7 at WordPress allows an attacker to change the API key.
0
Attacker Value
Unknown
CVE-2022-1604
Disclosure Date: June 13, 2022 (last updated October 07, 2023)
The MailerLite WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
0
Attacker Value
Unknown
CVE-2022-20614
Disclosure Date: January 12, 2022 (last updated October 25, 2023)
A missing permission check in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
0
Attacker Value
Unknown
CVE-2022-20613
Disclosure Date: January 12, 2022 (last updated October 25, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins Mailer Plugin 391.ve4a_38c1b_cf4b_ and earlier allows attackers to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
0
Attacker Value
Unknown
CVE-2021-23400
Disclosure Date: June 29, 2021 (last updated November 28, 2024)
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
0