{ "schema_version": "1.4.0", "id": "GHSA-vj38-gv8h-w8rj", "modified": "2022-05-14T01:38:55Z", "published": "2022-05-14T01:38:55Z", "aliases": [ "CVE-2015-9276" ], "details": "SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9276" }, { "type": "WEB", "url": "https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf" }, { "type": "WEB", "url": "https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails" }, { "type": "WEB", "url": "https://www.smartertools.com/smartermail/release-notes/13" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-01-16T16:29:00Z" } }