8 results (0.009 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the currentRequest parameter. MDaemon Technologies SecurityGateway for Email Servers versión 8.5.2, es vulnerable a un ataque de tipo Cross Site Scripting (XSS) por medio del parámetro currentRequest. • https://files.mdaemon.com/securitygateway/release/relnotes_en.htm https://gtn.com.np/wp-content/uploads/2022/07/Authenticated-Reflected-Cross-Site-Scripting-XSS-at-currentRequest-Parameter.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the rulles_list_ajax endpoint. MDaemon Technologies SecurityGateway for Email Servers versión 8.5.2, es vulnerable aun ataque de tipo Cross Site Scripting (XSS) por medio del endpoint rulles_list_ajax. • https://files.mdaemon.com/securitygateway/release/relnotes_en.htm https://gtn.com.np/wp-content/uploads/2022/07/Stored-Cross-Site-Scripting-XSS.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to HTTP Response splitting via the format parameter. MDaemon Technologies SecurityGateway for Email Servers versión 8.5.2, es vulnerable a una división de respuestas HTTP por medio del parámetro format. • https://files.mdaemon.com/securitygateway/release/relnotes_en.htm https://gtn.com.np/wp-content/uploads/2022/07/HTTP-Response-splitting-through-format-parameter.pdf • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the data_leak_list_ajax endpoint. MDaemon Technologies SecurityGateway for Email Servers versión 8.5.2, es vulnerable a un ataque de tipo Cross Site Scripting (XSS) por medio del endpoint data_leak_list_ajax. • https://files.mdaemon.com/securitygateway/release/relnotes_en.htm https://gtn.com.np/wp-content/uploads/2022/07/Stored-Cross-Site-Scripting-XSS-at-data_leak_list_ajax-endpoint.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

MDaemon Technologies SecurityGateway for Email Servers 8.5.2, is vulnerable to HTTP Response splitting via the data parameter. MDaemon Technologies SecurityGateway for Email Servers 8.5.2, es vulnerable a la división de la respuesta HTTP por medio del parámetro data. • https://files.mdaemon.com/securitygateway/release/relnotes_en.htm https://gtn.com.np/wp-content/uploads/2022/07/HTTP-Response-splitting-through-DATA-parameter.pdf • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •