Show filters
162 Total Results
Displaying 41-50 of 162
Sort by:
Attacker Value
Unknown

CVE-2022-37244

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to IFRAME Injectionvia the currentRequest parameter. after login leads to inject malicious tag leads to IFRAME injection.
Attacker Value
Unknown

CVE-2022-37243

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the whitelist endpoint.
Attacker Value
Unknown

CVE-2022-37242

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2, is vulnerable to HTTP Response splitting via the data parameter.
Attacker Value
Unknown

CVE-2022-37241

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the data_leak_list_ajax endpoint.
Attacker Value
Unknown

CVE-2022-37240

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to HTTP Response splitting via the format parameter.
Attacker Value
Unknown

CVE-2022-37239

Disclosure Date: August 25, 2022 (last updated October 08, 2023)
MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the rulles_list_ajax endpoint.
Attacker Value
Unknown

CVE-2022-2324

Disclosure Date: July 29, 2022 (last updated October 08, 2023)
Improperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. This vulnerability impacts 10.0.17.7319 and earlier versions
Attacker Value
Unknown

CVE-2022-20798

Disclosure Date: June 15, 2022 (last updated October 07, 2023)
A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.
Attacker Value
Unknown

CVE-2022-20664

Disclosure Date: June 15, 2022 (last updated October 07, 2023)
A vulnerability in the web management interface of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to retrieve sensitive information from a Lightweight Directory Access Protocol (LDAP) external authentication server connected to an affected device. This vulnerability is due to a lack of proper input sanitization while querying the external authentication server. An attacker could exploit this vulnerability by sending a crafted query through an external authentication web page. A successful exploit could allow the attacker to gain access to sensitive information, including user credentials from the external authentication server. To exploit this vulnerability, an attacker would need valid operator-level (or higher) credentials.
Attacker Value
Unknown

CVE-2020-36519

Disclosure Date: March 16, 2022 (last updated October 07, 2023)
Mimecast Email Security before 2020-01-10 allows any admin to spoof any domain, and pass DMARC alignment via SPF. This occurs through misuse of the address rewrite feature. (The domain being spoofed must be a customer in the Mimecast grid from which the spoofing occurs.)