SuperWebmailer 漏洞列表
共找到 6 个与 SuperWebmailer 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2020-11546: SuperWebmailer 7.21.0.01526 - Remote Code Execution POC
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection. -
CVE-2023-38192: SuperWebMailer 9.00.0.01710 - Cross-Site Scripting POC
An issue was discovered in SuperWebMailer 9.00.0.01710 allowing XSS via crafted incorrect passwords. -
CVE-2023-38194: SuperWebMailer - Cross-Site Scripting POC
An issue was discovered in SuperWebMailer 9.00.0.01710 that allows keepalive.php XSS via a GET parameter. -
CVE-2024-24131: SuperWebMailer 9.31.0.01799 - Cross-Site Scripting POC
SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php. -
SuperWebMailer api.php 存在XSS漏洞 (CVE-2024-24131) 无POC
Superwebmailer是一个基于 Web 的 PHP 通讯软件。SuperWebMailer 9.31.0.01799 api.php存在XSS漏洞。攻击者可以通过诱骗用户跟随一个特制的链接来利用这个问题,从而允许攻击者在受害者的浏览器上下文中执行javascript。 -
SuperWebmailer 7.21.0.01526 远程命令执行 (CVE-2020-11546) 无POC
Superwebmailer是一个基于 Web 的 PHP 通讯软件,用于通讯收件人管理,发送 HTML 通讯,生日电子邮件。SuperWebMailer7.21.0.01526版本中的mailingupgrade.php文件的‘Language’参数存在注入漏洞。攻击者可利用该漏洞执行任意的PHP代码。