Summary
Detail | |||
---|---|---|---|
Vendor | Openfind | First view | 2020-06-23 |
Product | Mailaudit | Last view | 2024-07-15 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:openfind:mailaudit:5.0:*:*:*:*:*:*:* | 3 |
cpe:2.3:a:openfind:mailaudit:4.0:*:*:*:*:*:*:* | 2 |
cpe:2.3:a:openfind:mailaudit:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2024-07-15 | CVE-2024-6739 | The session cookie in MailGates and MailAudit from Openfind does not have the HttpOnly flag enabled, allowing remote attackers to potentially steal the session cookie via XSS. |
8.8 | 2020-11-01 | CVE-2020-25849 | MailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user’s access token. |
9.8 | 2020-06-23 | CVE-2020-12782 | Openfind MailGates contains a Command Injection flaw, when receiving email with specific strings, malicious code in the mail attachment will be triggered and gain unauthorized access to system files. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
33% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
33% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |