Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Mail2000
(Openfind)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 9 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-07-15 | CVE-2024-6741 | Openfind's Mail2000 has a vulnerability that allows the HttpOnly flag to be bypassed. Unauthenticated remote attackers can exploit this vulnerability using specific JavaScript code to obtain the session cookie with the HttpOnly flag enabled. | Mail2000 | 5.3 | ||
2024-07-15 | CVE-2024-6740 | Openfind's Mail2000 does not properly validate email atachments, allowing unauthenticated remote attackers to inject JavaScript code within the attachment and perform Stored Cross-site scripting attacks. | Mail2000 | 6.1 | ||
2023-06-02 | CVE-2023-28705 | Openfind Mail2000 has insufficient filtering special characters of email content of its content filtering function. A remote attacker can exploit this vulnerability using phishing emails that contain malicious web pages injected with JavaScript. When users access the system and open the email, it triggers an XSS (Reflected Cross-site scripting) attack. | Mail2000 | 6.1 | ||
2023-03-27 | CVE-2023-22902 | Openfind Mail2000 file uploading function has insufficient filtering for user input. An authenticated remote attacker with general user privilege can exploit this vulnerability to inject JavaScript, conducting an XSS attack. | Mail2000 | 5.4 | ||
2020-09-01 | CVE-2020-12776 | Openfind Mail2000 contains Broken Access Control vulnerability, which can be used to execute unauthorized commands after attackers obtain the administrator access token or cookie. | Mail2000 | 7.2 | ||
2019-11-20 | CVE-2019-15073 | An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities. | Mail2000 | N/A | ||
2019-11-20 | CVE-2019-15072 | The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities. | Mail2000 | N/A | ||
2019-11-20 | CVE-2019-15071 | The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities. | Mail2000 | N/A | ||
2019-06-19 | CVE-2019-9763 | An issue was discovered in Openfind Mail2000 6.0 and 7.0 Webmail. XSS can occur via an '<object data="data:text/html' substring in an e-mail message (The vendor subsequently patched this). | Mail2000 | 6.1 |