Search criteria

9 vulnerabilities found for axigen_mail_server by gecad

FKIE_CVE-2010-3459

Vulnerability from fkie_nvd - Published: 2010-09-17 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
gecad axigen_mail_server *
gecad axigen_mail_server -
gecad axigen_mail_server 1.0.1
gecad axigen_mail_server 1.0.2
gecad axigen_mail_server 1.0.5
gecad axigen_mail_server 1.0.6
gecad axigen_mail_server 1.0.7
gecad axigen_mail_server 1.1.0
gecad axigen_mail_server 1.1.0
gecad axigen_mail_server 1.1.1
gecad axigen_mail_server 1.2.0
gecad axigen_mail_server 1.2.0
gecad axigen_mail_server 1.2.3
gecad axigen_mail_server 1.2.4
gecad axigen_mail_server 1.2.5
gecad axigen_mail_server 1.2.5
gecad axigen_mail_server 1.2.6
gecad axigen_mail_server 2.0
gecad axigen_mail_server 2.0.3
gecad axigen_mail_server 2.0.4
gecad axigen_mail_server 2.0.5
gecad axigen_mail_server 3.0
gecad axigen_mail_server 3.0
gecad axigen_mail_server 3.0.1
gecad axigen_mail_server 4.0
gecad axigen_mail_server 4.0
gecad axigen_mail_server 4.0.1
gecad axigen_mail_server 4.0.2
gecad axigen_mail_server 5.0
gecad axigen_mail_server 5.0
gecad axigen_mail_server 5.0.1
gecad axigen_mail_server 5.0.2
gecad axigen_mail_server 5.0.3
gecad axigen_mail_server 6.0.1
gecad axigen_mail_server 6.1
gecad axigen_mail_server 6.1
gecad axigen_mail_server 6.2
gecad axigen_mail_server 6.2.2
gecad axigen_mail_server 7.0
gecad axigen_mail_server 7.0
gecad axigen_mail_server 7.1
gecad axigen_mail_server 7.1.1
gecad axigen_mail_server 7.1.2
gecad axigen_mail_server 7.1.3
gecad axigen_mail_server 7.1.4
gecad axigen_mail_server 7.2
gecad axigen_mail_server 7.2
gecad axigen_mail_server 7.2.1
gecad axigen_mail_server 7.3
gecad axigen_mail_server 7.3
gecad axigen_mail_server 7.3.1
gecad axigen_mail_server 7.3.2
gecad axigen_mail_server 7.3.3
gecad axigen_mail_server 7.4
gecad axigen_mail_server 7.4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC4AA81-6053-44C4-9129-17BC364767BD",
              "versionEndIncluding": "7.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9C8AA4B4-B9B4-46E8-B3B6-4616DDCABB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62797EB-6B31-42C8-8070-A126B7824358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DE274D-CFC3-4A07-BA41-E761C7B2492E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B44215D-3BC3-4F69-BA25-BB245D8334E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "153FE68B-BF39-4A48-8661-133441E6A9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E4FB74E-F428-4D8B-8348-0BDD4640071E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7123D3C-EBCA-4EAE-BDB9-1BDD0DEA5AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "478F93E7-0C69-4F5E-8B2B-2E594D418131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D44F284-E5F9-49AE-81FB-FE3C8D046D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72E9D23-3A65-4BE3-8867-5F96865389C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F6D81E6-B50A-4355-A3E1-8041B7328DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB64A58D-FD23-44A2-9F79-5E856FDB38C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "69532EAC-4A32-44C8-A51B-3E39A7106F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEECFFB8-4792-42B4-BD3C-3016BE4330F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:b:*:*:*:*:*:*",
              "matchCriteriaId": "A22932ED-5F58-4DDD-88C6-95548E1A1AFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3444AE24-8B86-459C-98C9-6820FEC95D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C30393-380E-4728-99AB-8B2C7B81B6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D919CD37-E987-4391-9602-C8C221A29919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3407900D-7B76-4D8A-8F10-BFF3B497CD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FFAAD5-FCF2-420B-9B91-9EAFCAB59A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "368A9606-ED73-48BF-B923-E51C9018F042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "001C19A6-1D99-476D-B9DB-6D9E3E5D1E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "98F794BC-242C-4B7C-83FB-607EED78FD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FB322C-AD7E-4481-95D2-CE1CAC3F5B53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "98D94943-C343-4AF4-844B-6886B4F24421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA886A97-82AA-4488-8A7E-5EE5A292E38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF07D225-6227-4266-9207-5CCFCCD3371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEDE33D-25F3-44E6-87EC-0D16096DFF03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B1841-99C6-45D0-97CE-EF7A2F0CF7FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF74869-E66A-4E43-9286-6F30AAA8CEFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC45FBA-D58C-4775-9225-D4E0F7117510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9392DE24-CF35-4805-911C-B7EBF5C16392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52309DC-D0C4-4C5A-9BA6-900361466BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C89FD65-166B-40A8-921D-53A28D422219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B58CFD7F-985B-40BE-A783-3F63A3F3762A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92B63E6-71FD-43AE-BF9C-1E498B0BF6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A87B2A89-293B-4AF9-9F3A-B0C1EB401087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C09BD3CB-603A-41E8-97A4-EE79ED417D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE805B25-80EF-4F7D-9C0F-ACE13DBC0BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07478BE4-1082-4F17-AC7C-3664E94126B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C9F3E3-1027-49CD-9A58-D8AC48F53020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E3AC95-B859-49DB-8AC2-3DA59862132B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "825E857B-0335-40E4-83C8-35BE6DE46E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "041F7DB5-3B50-42EC-8F82-59692E7695B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7077934E-3E6A-46B1-82EA-1C255B91B5E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452E962-2D15-440A-B202-64E4D108DC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60997606-A019-4EEA-9448-34FE0AF53C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9CEC4BBF-D686-4F1D-9A67-9265899406CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B478AA48-E200-41DF-AF5C-165F9EAC6A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94467CF0-FA6B-43EA-9734-723DF21E0236",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0AFE6B-3CE6-4F7A-B0C7-79608FEF7F05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71769EC-A983-42B1-96AB-FD145CA23BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1A568477-89D4-4DCF-802B-52388BC9DA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la interfaz Ajax Webmail en AXIGEN Mail Server anterior a v7.4.2 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2010-3459",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-09-17T20:00:02.540",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41430"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/68026"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/43230"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2415"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/68026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/43230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-3460

Vulnerability from fkie_nvd - Published: 2010-09-17 20:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Impacted products
Vendor Product Version
gecad axigen_mail_server *
gecad axigen_mail_server -
gecad axigen_mail_server 1.0.1
gecad axigen_mail_server 1.0.2
gecad axigen_mail_server 1.0.5
gecad axigen_mail_server 1.0.6
gecad axigen_mail_server 1.0.7
gecad axigen_mail_server 1.1.0
gecad axigen_mail_server 1.1.0
gecad axigen_mail_server 1.1.1
gecad axigen_mail_server 1.2.0
gecad axigen_mail_server 1.2.0
gecad axigen_mail_server 1.2.3
gecad axigen_mail_server 1.2.4
gecad axigen_mail_server 1.2.5
gecad axigen_mail_server 1.2.5
gecad axigen_mail_server 1.2.6
gecad axigen_mail_server 2.0
gecad axigen_mail_server 2.0.3
gecad axigen_mail_server 2.0.4
gecad axigen_mail_server 2.0.5
gecad axigen_mail_server 3.0
gecad axigen_mail_server 3.0
gecad axigen_mail_server 3.0.1
gecad axigen_mail_server 4.0
gecad axigen_mail_server 4.0
gecad axigen_mail_server 4.0.1
gecad axigen_mail_server 4.0.2
gecad axigen_mail_server 5.0
gecad axigen_mail_server 5.0
gecad axigen_mail_server 5.0.1
gecad axigen_mail_server 5.0.2
gecad axigen_mail_server 5.0.3
gecad axigen_mail_server 6.0.1
gecad axigen_mail_server 6.1
gecad axigen_mail_server 6.1
gecad axigen_mail_server 6.2
gecad axigen_mail_server 6.2.2
gecad axigen_mail_server 7.0
gecad axigen_mail_server 7.0
gecad axigen_mail_server 7.1
gecad axigen_mail_server 7.1.1
gecad axigen_mail_server 7.1.2
gecad axigen_mail_server 7.1.3
gecad axigen_mail_server 7.1.4
gecad axigen_mail_server 7.2
gecad axigen_mail_server 7.2
gecad axigen_mail_server 7.2.1
gecad axigen_mail_server 7.3
gecad axigen_mail_server 7.3
gecad axigen_mail_server 7.3.1
gecad axigen_mail_server 7.3.2
gecad axigen_mail_server 7.3.3
gecad axigen_mail_server 7.4
gecad axigen_mail_server 7.4
microsoft windows *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FC4AA81-6053-44C4-9129-17BC364767BD",
              "versionEndIncluding": "7.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:-:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9C8AA4B4-B9B4-46E8-B3B6-4616DDCABB8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62797EB-6B31-42C8-8070-A126B7824358",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39DE274D-CFC3-4A07-BA41-E761C7B2492E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B44215D-3BC3-4F69-BA25-BB245D8334E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "153FE68B-BF39-4A48-8661-133441E6A9FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E4FB74E-F428-4D8B-8348-0BDD4640071E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7123D3C-EBCA-4EAE-BDB9-1BDD0DEA5AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "478F93E7-0C69-4F5E-8B2B-2E594D418131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D44F284-E5F9-49AE-81FB-FE3C8D046D59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72E9D23-3A65-4BE3-8867-5F96865389C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F6D81E6-B50A-4355-A3E1-8041B7328DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB64A58D-FD23-44A2-9F79-5E856FDB38C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "69532EAC-4A32-44C8-A51B-3E39A7106F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEECFFB8-4792-42B4-BD3C-3016BE4330F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.5:b:*:*:*:*:*:*",
              "matchCriteriaId": "A22932ED-5F58-4DDD-88C6-95548E1A1AFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3444AE24-8B86-459C-98C9-6820FEC95D5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C30393-380E-4728-99AB-8B2C7B81B6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D919CD37-E987-4391-9602-C8C221A29919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3407900D-7B76-4D8A-8F10-BFF3B497CD1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FFAAD5-FCF2-420B-9B91-9EAFCAB59A63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "368A9606-ED73-48BF-B923-E51C9018F042",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "001C19A6-1D99-476D-B9DB-6D9E3E5D1E8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "98F794BC-242C-4B7C-83FB-607EED78FD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FB322C-AD7E-4481-95D2-CE1CAC3F5B53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "98D94943-C343-4AF4-844B-6886B4F24421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA886A97-82AA-4488-8A7E-5EE5A292E38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF07D225-6227-4266-9207-5CCFCCD3371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEDE33D-25F3-44E6-87EC-0D16096DFF03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "EF1B1841-99C6-45D0-97CE-EF7A2F0CF7FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF74869-E66A-4E43-9286-6F30AAA8CEFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC45FBA-D58C-4775-9225-D4E0F7117510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9392DE24-CF35-4805-911C-B7EBF5C16392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52309DC-D0C4-4C5A-9BA6-900361466BCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C89FD65-166B-40A8-921D-53A28D422219",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "B58CFD7F-985B-40BE-A783-3F63A3F3762A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92B63E6-71FD-43AE-BF9C-1E498B0BF6E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A87B2A89-293B-4AF9-9F3A-B0C1EB401087",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "C09BD3CB-603A-41E8-97A4-EE79ED417D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE805B25-80EF-4F7D-9C0F-ACE13DBC0BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "07478BE4-1082-4F17-AC7C-3664E94126B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C9F3E3-1027-49CD-9A58-D8AC48F53020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E3AC95-B859-49DB-8AC2-3DA59862132B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "825E857B-0335-40E4-83C8-35BE6DE46E7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "041F7DB5-3B50-42EC-8F82-59692E7695B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "7077934E-3E6A-46B1-82EA-1C255B91B5E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4452E962-2D15-440A-B202-64E4D108DC36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "60997606-A019-4EEA-9448-34FE0AF53C4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9CEC4BBF-D686-4F1D-9A67-9265899406CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B478AA48-E200-41DF-AF5C-165F9EAC6A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "94467CF0-FA6B-43EA-9734-723DF21E0236",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F0AFE6B-3CE6-4F7A-B0C7-79608FEF7F05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71769EC-A983-42B1-96AB-FD145CA23BAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:7.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "1A568477-89D4-4DCF-802B-52388BC9DA33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en la interfaz HTTP en AXIGEN Mail Server v7.4.1 para Windows permite a atacantes remotos leer archivos a su elecci\u00f3n a trav\u00e9s de un %5C (barra invertida codificada) en la URL."
    }
  ],
  "id": "CVE-2010-3460",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-09-17T20:00:02.820",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41430"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/68027"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/43230"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2415"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/41430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/68027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/43230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2415"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1484

Vulnerability from fkie_nvd - Published: 2009-04-29 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Impacted products
Vendor Product Version
gecad axigen_mail_server 6.2.2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gecad:axigen_mail_server:6.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "30879EDE-262D-4CD7-B67C-39ABEB945881",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n del interfaz de correo web en AXIGEN Mail Server 6.2.2 permite a atacantes remotos inyectar HTML o scripts web arbitrarios a trav\u00e9s de vectores sin especificar involucrando mensajes de correo electr\u00f3nico. NOTA: la procedencia de esta informaci\u00f3n es desconocida, los detalles son obtenidos exclusivamente de la informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2009-1484",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-04-29T18:30:00.407",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34402"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34716"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34716"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2010-3459 (GCVE-0-2010-3459)

Vulnerability from cvelistv5 – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/68026 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/2415 vdb-entryx_refsource_VUPEN
http://www.axigen.com/press/product-releases/axig… x_refsource_CONFIRM
http://secunia.com/advisories/41430 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/43230 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:44.505Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "68026",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/68026"
          },
          {
            "name": "ADV-2010-2415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
          },
          {
            "name": "41430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41430"
          },
          {
            "name": "43230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43230"
          },
          {
            "name": "axigenmailserver-ajax-webmail-xss(61825)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "68026",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/68026"
        },
        {
          "name": "ADV-2010-2415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
        },
        {
          "name": "41430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41430"
        },
        {
          "name": "43230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43230"
        },
        {
          "name": "axigenmailserver-ajax-webmail-xss(61825)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "68026",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/68026"
            },
            {
              "name": "ADV-2010-2415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2415"
            },
            {
              "name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
              "refsource": "CONFIRM",
              "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
            },
            {
              "name": "41430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41430"
            },
            {
              "name": "43230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43230"
            },
            {
              "name": "axigenmailserver-ajax-webmail-xss(61825)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3459",
    "datePublished": "2010-09-17T19:00:00",
    "dateReserved": "2010-09-17T00:00:00",
    "dateUpdated": "2024-08-07T03:11:44.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3460 (GCVE-0-2010-3460)

Vulnerability from cvelistv5 – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:43.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
          },
          {
            "name": "ADV-2010-2415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
          },
          {
            "name": "axigenmailserver-httpserver-dir-traversal(61826)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
          },
          {
            "name": "68027",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/68027"
          },
          {
            "name": "41430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41430"
          },
          {
            "name": "43230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43230"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
        },
        {
          "name": "ADV-2010-2415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
        },
        {
          "name": "axigenmailserver-httpserver-dir-traversal(61826)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
        },
        {
          "name": "68027",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/68027"
        },
        {
          "name": "41430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41430"
        },
        {
          "name": "43230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43230"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3460",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
            },
            {
              "name": "ADV-2010-2415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2415"
            },
            {
              "name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
              "refsource": "CONFIRM",
              "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
            },
            {
              "name": "axigenmailserver-httpserver-dir-traversal(61826)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
            },
            {
              "name": "68027",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/68027"
            },
            {
              "name": "41430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41430"
            },
            {
              "name": "43230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43230"
            },
            {
              "name": "http://www.acunetix.com/blog/news/directory-traversal-axigen/",
              "refsource": "MISC",
              "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3460",
    "datePublished": "2010-09-17T19:00:00",
    "dateReserved": "2010-09-17T00:00:00",
    "dateUpdated": "2024-08-07T03:11:43.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1484 (GCVE-0-2009-1484)

Vulnerability from cvelistv5 – Published: 2009-04-29 18:06 – Updated: 2024-09-16 16:27
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/34716 vdb-entryx_refsource_BID
http://secunia.com/advisories/34402 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.565Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34716",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34716"
          },
          {
            "name": "34402",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-29T18:06:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34716",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34716"
        },
        {
          "name": "34402",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1484",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34716",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34716"
            },
            {
              "name": "34402",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1484",
    "datePublished": "2009-04-29T18:06:00Z",
    "dateReserved": "2009-04-29T00:00:00Z",
    "dateUpdated": "2024-09-16T16:27:32.001Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3459 (GCVE-0-2010-3459)

Vulnerability from nvd – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.osvdb.org/68026 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/2415 vdb-entryx_refsource_VUPEN
http://www.axigen.com/press/product-releases/axig… x_refsource_CONFIRM
http://secunia.com/advisories/41430 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/43230 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:44.505Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "68026",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/68026"
          },
          {
            "name": "ADV-2010-2415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
          },
          {
            "name": "41430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41430"
          },
          {
            "name": "43230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43230"
          },
          {
            "name": "axigenmailserver-ajax-webmail-xss(61825)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "68026",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/68026"
        },
        {
          "name": "ADV-2010-2415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
        },
        {
          "name": "41430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41430"
        },
        {
          "name": "43230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43230"
        },
        {
          "name": "axigenmailserver-ajax-webmail-xss(61825)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3459",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Ajax WebMail interface in AXIGEN Mail Server before 7.4.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "68026",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/68026"
            },
            {
              "name": "ADV-2010-2415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2415"
            },
            {
              "name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
              "refsource": "CONFIRM",
              "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
            },
            {
              "name": "41430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41430"
            },
            {
              "name": "43230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43230"
            },
            {
              "name": "axigenmailserver-ajax-webmail-xss(61825)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61825"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3459",
    "datePublished": "2010-09-17T19:00:00",
    "dateReserved": "2010-09-17T00:00:00",
    "dateUpdated": "2024-08-07T03:11:44.505Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-3460 (GCVE-0-2010-3460)

Vulnerability from nvd – Published: 2010-09-17 19:00 – Updated: 2024-08-07 03:11
VLAI?
Summary
Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:43.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
          },
          {
            "name": "ADV-2010-2415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/2415"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
          },
          {
            "name": "axigenmailserver-httpserver-dir-traversal(61826)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
          },
          {
            "name": "68027",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/68027"
          },
          {
            "name": "41430",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/41430"
          },
          {
            "name": "43230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/43230"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
        },
        {
          "name": "ADV-2010-2415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/2415"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
        },
        {
          "name": "axigenmailserver-httpserver-dir-traversal(61826)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
        },
        {
          "name": "68027",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/68027"
        },
        {
          "name": "41430",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/41430"
        },
        {
          "name": "43230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/43230"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-3460",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt"
            },
            {
              "name": "ADV-2010-2415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/2415"
            },
            {
              "name": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html",
              "refsource": "CONFIRM",
              "url": "http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html"
            },
            {
              "name": "axigenmailserver-httpserver-dir-traversal(61826)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61826"
            },
            {
              "name": "68027",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/68027"
            },
            {
              "name": "41430",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/41430"
            },
            {
              "name": "43230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/43230"
            },
            {
              "name": "http://www.acunetix.com/blog/news/directory-traversal-axigen/",
              "refsource": "MISC",
              "url": "http://www.acunetix.com/blog/news/directory-traversal-axigen/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-3460",
    "datePublished": "2010-09-17T19:00:00",
    "dateReserved": "2010-09-17T00:00:00",
    "dateUpdated": "2024-08-07T03:11:43.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1484 (GCVE-0-2009-1484)

Vulnerability from nvd – Published: 2009-04-29 18:06 – Updated: 2024-09-16 16:27
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/34716 vdb-entryx_refsource_BID
http://secunia.com/advisories/34402 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.565Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34716",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34716"
          },
          {
            "name": "34402",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34402"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-29T18:06:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34716",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34716"
        },
        {
          "name": "34402",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34402"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1484",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34716",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34716"
            },
            {
              "name": "34402",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34402"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1484",
    "datePublished": "2009-04-29T18:06:00Z",
    "dateReserved": "2009-04-29T00:00:00Z",
    "dateUpdated": "2024-09-16T16:27:32.001Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}