Description
HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack.
References
https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html
Third Party Advisory
https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2023-03-27T02:15:09.997Z
2 years agoLast modified
2024-11-21T06:48:29.970Z
1 year ago