Search criteria
9 vulnerabilities found for axigen_mail_server by gecad
FKIE_CVE-2010-3459
Vulnerability from fkie_nvd - Published: 2010-09-17 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC4AA81-6053-44C4-9129-17BC364767BD",
"versionEndIncluding": "7.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:*",
"matchCriteriaId": "9C8AA4B4-B9B4-46E8-B3B6-4616DDCABB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E62797EB-6B31-42C8-8070-A126B7824358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39DE274D-CFC3-4A07-BA41-E761C7B2492E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B44215D-3BC3-4F69-BA25-BB245D8334E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "153FE68B-BF39-4A48-8661-133441E6A9FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4FB74E-F428-4D8B-8348-0BDD4640071E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7123D3C-EBCA-4EAE-BDB9-1BDD0DEA5AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "478F93E7-0C69-4F5E-8B2B-2E594D418131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D44F284-E5F9-49AE-81FB-FE3C8D046D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A72E9D23-3A65-4BE3-8867-5F96865389C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "0F6D81E6-B50A-4355-A3E1-8041B7328DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB64A58D-FD23-44A2-9F79-5E856FDB38C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "69532EAC-4A32-44C8-A51B-3E39A7106F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AEECFFB8-4792-42B4-BD3C-3016BE4330F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:b:*:*:*:*:*:*",
"matchCriteriaId": "A22932ED-5F58-4DDD-88C6-95548E1A1AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3444AE24-8B86-459C-98C9-6820FEC95D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65C30393-380E-4728-99AB-8B2C7B81B6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D919CD37-E987-4391-9602-C8C221A29919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3407900D-7B76-4D8A-8F10-BFF3B497CD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "26FFAAD5-FCF2-420B-9B91-9EAFCAB59A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "368A9606-ED73-48BF-B923-E51C9018F042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "001C19A6-1D99-476D-B9DB-6D9E3E5D1E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "98F794BC-242C-4B7C-83FB-607EED78FD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44FB322C-AD7E-4481-95D2-CE1CAC3F5B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "98D94943-C343-4AF4-844B-6886B4F24421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA886A97-82AA-4488-8A7E-5EE5A292E38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF07D225-6227-4266-9207-5CCFCCD3371C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEDE33D-25F3-44E6-87EC-0D16096DFF03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "EF1B1841-99C6-45D0-97CE-EF7A2F0CF7FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF74869-E66A-4E43-9286-6F30AAA8CEFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC45FBA-D58C-4775-9225-D4E0F7117510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9392DE24-CF35-4805-911C-B7EBF5C16392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E52309DC-D0C4-4C5A-9BA6-900361466BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C89FD65-166B-40A8-921D-53A28D422219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "B58CFD7F-985B-40BE-A783-3F63A3F3762A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D92B63E6-71FD-43AE-BF9C-1E498B0BF6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A87B2A89-293B-4AF9-9F3A-B0C1EB401087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "C09BD3CB-603A-41E8-97A4-EE79ED417D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE805B25-80EF-4F7D-9C0F-ACE13DBC0BB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07478BE4-1082-4F17-AC7C-3664E94126B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42C9F3E3-1027-49CD-9A58-D8AC48F53020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E3AC95-B859-49DB-8AC2-3DA59862132B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "825E857B-0335-40E4-83C8-35BE6DE46E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "041F7DB5-3B50-42EC-8F82-59692E7695B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "7077934E-3E6A-46B1-82EA-1C255B91B5E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4452E962-2D15-440A-B202-64E4D108DC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60997606-A019-4EEA-9448-34FE0AF53C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "9CEC4BBF-D686-4F1D-9A67-9265899406CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B478AA48-E200-41DF-AF5C-165F9EAC6A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94467CF0-FA6B-43EA-9734-723DF21E0236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0AFE6B-3CE6-4F7A-B0C7-79608FEF7F05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A71769EC-A983-42B1-96AB-FD145CA23BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "1A568477-89D4-4DCF-802B-52388BC9DA33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la interfaz Ajax Webmail en AXIGEN Mail Server anterior a v7.4.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2010-3459",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-09-17T20:00:02.540",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41430"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/68026"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/68026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-3460
Vulnerability from fkie_nvd - Published: 2010-09-17 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC4AA81-6053-44C4-9129-17BC364767BD",
"versionEndIncluding": "7.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:*",
"matchCriteriaId": "9C8AA4B4-B9B4-46E8-B3B6-4616DDCABB8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E62797EB-6B31-42C8-8070-A126B7824358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "39DE274D-CFC3-4A07-BA41-E761C7B2492E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B44215D-3BC3-4F69-BA25-BB245D8334E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "153FE68B-BF39-4A48-8661-133441E6A9FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4E4FB74E-F428-4D8B-8348-0BDD4640071E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7123D3C-EBCA-4EAE-BDB9-1BDD0DEA5AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "478F93E7-0C69-4F5E-8B2B-2E594D418131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D44F284-E5F9-49AE-81FB-FE3C8D046D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A72E9D23-3A65-4BE3-8867-5F96865389C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "0F6D81E6-B50A-4355-A3E1-8041B7328DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FB64A58D-FD23-44A2-9F79-5E856FDB38C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "69532EAC-4A32-44C8-A51B-3E39A7106F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AEECFFB8-4792-42B4-BD3C-3016BE4330F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:b:*:*:*:*:*:*",
"matchCriteriaId": "A22932ED-5F58-4DDD-88C6-95548E1A1AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3444AE24-8B86-459C-98C9-6820FEC95D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "65C30393-380E-4728-99AB-8B2C7B81B6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D919CD37-E987-4391-9602-C8C221A29919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3407900D-7B76-4D8A-8F10-BFF3B497CD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "26FFAAD5-FCF2-420B-9B91-9EAFCAB59A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "368A9606-ED73-48BF-B923-E51C9018F042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "001C19A6-1D99-476D-B9DB-6D9E3E5D1E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "98F794BC-242C-4B7C-83FB-607EED78FD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44FB322C-AD7E-4481-95D2-CE1CAC3F5B53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "98D94943-C343-4AF4-844B-6886B4F24421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA886A97-82AA-4488-8A7E-5EE5A292E38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF07D225-6227-4266-9207-5CCFCCD3371C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BEDE33D-25F3-44E6-87EC-0D16096DFF03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "EF1B1841-99C6-45D0-97CE-EF7A2F0CF7FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF74869-E66A-4E43-9286-6F30AAA8CEFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC45FBA-D58C-4775-9225-D4E0F7117510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9392DE24-CF35-4805-911C-B7EBF5C16392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E52309DC-D0C4-4C5A-9BA6-900361466BCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C89FD65-166B-40A8-921D-53A28D422219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "B58CFD7F-985B-40BE-A783-3F63A3F3762A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D92B63E6-71FD-43AE-BF9C-1E498B0BF6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A87B2A89-293B-4AF9-9F3A-B0C1EB401087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "C09BD3CB-603A-41E8-97A4-EE79ED417D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EE805B25-80EF-4F7D-9C0F-ACE13DBC0BB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "07478BE4-1082-4F17-AC7C-3664E94126B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "42C9F3E3-1027-49CD-9A58-D8AC48F53020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E3AC95-B859-49DB-8AC2-3DA59862132B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "825E857B-0335-40E4-83C8-35BE6DE46E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "041F7DB5-3B50-42EC-8F82-59692E7695B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "7077934E-3E6A-46B1-82EA-1C255B91B5E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4452E962-2D15-440A-B202-64E4D108DC36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60997606-A019-4EEA-9448-34FE0AF53C4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "9CEC4BBF-D686-4F1D-9A67-9265899406CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B478AA48-E200-41DF-AF5C-165F9EAC6A28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94467CF0-FA6B-43EA-9734-723DF21E0236",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0AFE6B-3CE6-4F7A-B0C7-79608FEF7F05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A71769EC-A983-42B1-96AB-FD145CA23BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "1A568477-89D4-4DCF-802B-52388BC9DA33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
},
{
"lang": "es",
"value": "Vulnerabilidad de salto de directorio en la interfaz HTTP en AXIGEN Mail Server v7.4.1 para Windows permite a atacantes remotos leer archivos a su elecci\u00f3n a trav\u00e9s de un %5C (barra invertida codificada) en la URL."
}
],
"id": "CVE-2010-3460",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2010-09-17T20:00:02.820",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41430"
},
{
"source": "cve@mitre.org",
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/68027"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/41430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/68027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-1484
Vulnerability from fkie_nvd - Published: 2009-04-29 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| gecad | axigen_mail_server | 6.2.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
},
{
"lang": "es",
"value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n del interfaz de correo web en AXIGEN Mail Server 6.2.2 permite a atacantes remotos inyectar HTML o scripts web arbitrarios a trav\u00e9s de vectores sin especificar involucrando mensajes de correo electr\u00f3nico. NOTA: la procedencia de esta informaci\u00f3n es desconocida, los detalles son obtenidos exclusivamente de la informaci\u00f3n de terceros."
}
],
"id": "CVE-2009-1484",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-04-29T18:30:00.407",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34402"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34402"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34716"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2010-3459 (GCVE-0-2010-3459)
Vulnerability from cvelistv5 – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:11:44.505Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "68026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "68026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3459",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "68026",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
"refsource": "CONFIRM",
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3459",
"datePublished": "2010-09-17T19:00:00",
"dateReserved": "2010-09-17T00:00:00",
"dateUpdated": "2024-08-07T03:11:44.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3460 (GCVE-0-2010-3460)
Vulnerability from cvelistv5 – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:11:43.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3460",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
"refsource": "CONFIRM",
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "http://www.acunetix.com/blog/news/directory-traversal-axigen/",
"refsource": "MISC",
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3460",
"datePublished": "2010-09-17T19:00:00",
"dateReserved": "2010-09-17T00:00:00",
"dateUpdated": "2024-08-07T03:11:43.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-1484 (GCVE-0-2009-1484)
Vulnerability from cvelistv5 – Published: 2009-04-29 18:06 – Updated: 2024-09-16 16:27
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "34716",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34402"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-04-29T18:06:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "34716",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34402"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "34716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34402"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1484",
"datePublished": "2009-04-29T18:06:00Z",
"dateReserved": "2009-04-29T00:00:00Z",
"dateUpdated": "2024-09-16T16:27:32.001Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3459 (GCVE-0-2010-3459)
Vulnerability from nvd – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:11:44.505Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "68026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "68026",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3459",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "68026",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68026"
},
{
"name": "ADV-2010-2415",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
"refsource": "CONFIRM",
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "41430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "axigenmailserver-ajax-webmail-xss(61825)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3459",
"datePublished": "2010-09-17T19:00:00",
"dateReserved": "2010-09-17T00:00:00",
"dateUpdated": "2024-08-07T03:11:44.505Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-3460 (GCVE-0-2010-3460)
Vulnerability from nvd – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T03:11:43.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-07-10T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/43230"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3460",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
},
{
"name": "ADV-2010-2415",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2415"
},
{
"name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
"refsource": "CONFIRM",
"url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
},
{
"name": "axigenmailserver-httpserver-dir-traversal(61826)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
},
{
"name": "68027",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/68027"
},
{
"name": "41430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41430"
},
{
"name": "43230",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/43230"
},
{
"name": "http://www.acunetix.com/blog/news/directory-traversal-axigen/",
"refsource": "MISC",
"url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-3460",
"datePublished": "2010-09-17T19:00:00",
"dateReserved": "2010-09-17T00:00:00",
"dateUpdated": "2024-08-07T03:11:43.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-1484 (GCVE-0-2009-1484)
Vulnerability from nvd – Published: 2009-04-29 18:06 – Updated: 2024-09-16 16:27
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:13:25.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "34716",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34402"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-04-29T18:06:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "34716",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34402"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "34716",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34716"
},
{
"name": "34402",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34402"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-1484",
"datePublished": "2009-04-29T18:06:00Z",
"dateReserved": "2009-04-29T00:00:00Z",
"dateUpdated": "2024-09-16T16:27:32.001Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}