CSRF vulnerability in Mailrelay plugin <= 2.1.1 versions
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Mailrelay < 2.1.2 - Arbitrary Settings Update via CSRF | 17 Oct 202300:00 | – | wpvulndb |
![]() | CVE-2023-45108 WordPress Mailrelay Plugin <= 2.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | 13 Oct 202312:03 | – | cvelist |
![]() | WordPress Mailrelay Plugin <= 2.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | 6 Oct 202300:00 | – | patchstack |
![]() | Cross site request forgery (csrf) | 13 Oct 202313:15 | – | prion |
![]() | CVE-2023-45108 WordPress Mailrelay Plugin <= 2.1.1 is vulnerable to Cross Site Request Forgery (CSRF) | 13 Oct 202312:03 | – | vulnrichment |
![]() | CVE-2023-45108 | 13 Oct 202313:15 | – | nvd |
![]() | Wordfence Intelligence Weekly WordPress Vulnerability Report (October 2, 2023 to October 8, 2023) | 12 Oct 202315:22 | – | wordfence |
[
{
"collectionURL": "https://wordpress.org/plugins",
"defaultStatus": "unaffected",
"packageName": "mailrelay",
"product": "Mailrelay",
"vendor": "Mailrelay",
"versions": [
{
"lessThanOrEqual": "2.1.1",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo