Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SmarterTools | SmarterMail | 0 ~ 100.0.9511 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Detected a SmartMail admin password reset vulnerability by sending a POST request to the `/api/v1/auth/force-reset-password` endpoint, indicating that administrative password resets could potentially be triggered without proper authorization. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-23760.yaml | POC Details |
| 2 | SmarterMail Auth Bypass & RCE Exploit | https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE | POC Details |
| 3 | CVE-2026-23760 - An authentication bypass via password reset API in SmarterMail. | https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet