Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Unknown

CVE-2021-22848

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
HGiga MailSherlock contains a SQL Injection. Remote attackers can inject SQL syntax and execute SQL commands in a URL parameter of email pages without privilege.
Attacker Value
Unknown

CVE-2020-35742

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock contains a vulnerability of SQL Injection. Attackers can inject and launch SQL commands in a URL parameter.
Attacker Value
Unknown

CVE-2020-25848

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock contains weak authentication flaw that attackers grant privilege remotely with default password generation mechanism.
Attacker Value
Unknown

CVE-2020-25850

Disclosure Date: December 31, 2020 (last updated November 28, 2024)
The function, view the source code, of HGiga MailSherlock does not validate specific characters. Remote attackers can use this flaw to download arbitrary system files.
Attacker Value
Unknown

CVE-2020-35740

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock does not validate specific URL parameters properly that allows attackers to inject JavaScript syntax for XSS attacks.
Attacker Value
Unknown

CVE-2020-35743

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock contains a SQL injection flaw. Attackers can inject and launch SQL commands in a URL parameter of specific cgi pages.
Attacker Value
Unknown

CVE-2020-35741

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock does not validate user parameters on multiple login pages. Attackers can use the vulnerability to inject JavaScript syntax for XSS attacks.
Attacker Value
Unknown

CVE-2020-35851

Disclosure Date: December 31, 2020 (last updated February 22, 2025)
HGiga MailSherlock does not validate specific parameters properly. Attackers can use the vulnerability to launch Command inject attacks remotely and execute arbitrary commands of the system.