Sonicwall

Email Security

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 20.11.2025 12:19:17
  • Zuletzt bearbeitet 21.11.2025 15:13:13

A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the in...

Medienbericht
  • EPSS 0.02%
  • Veröffentlicht 20.11.2025 12:17:14
  • Zuletzt bearbeitet 21.11.2025 15:13:59

Download of Code Without Integrity Check Vulnerability in the SonicWall Email Security appliance loads root filesystem images without verifying signatures, allowing attackers with VMDK or datastore access to modify system files and gain persistent ar...

  • EPSS 0.19%
  • Veröffentlicht 14.03.2024 04:15:09
  • Zuletzt bearbeitet 21.11.2024 08:56:12

An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitr...

  • EPSS 0.21%
  • Veröffentlicht 14.02.2023 03:15:09
  • Zuletzt bearbeitet 20.03.2025 21:15:16

SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses.

Warnung
  • EPSS 67.58%
  • Veröffentlicht 18.12.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:31:58

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service wh...

Warnung
  • EPSS 94.34%
  • Veröffentlicht 14.12.2021 19:15:07
  • Zuletzt bearbeitet 27.10.2025 17:35:56

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a n...

Warnung Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.12.2021 10:15:09
  • Zuletzt bearbeitet 27.10.2025 17:40:33

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An atta...

Warnung
  • EPSS 60.3%
  • Veröffentlicht 20.04.2021 12:15:12
  • Zuletzt bearbeitet 12.11.2025 14:32:02

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host.

Warnung
  • EPSS 90.69%
  • Veröffentlicht 09.04.2021 18:15:13
  • Zuletzt bearbeitet 10.11.2025 19:04:58

A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.

Warnung
  • EPSS 32.6%
  • Veröffentlicht 09.04.2021 18:15:13
  • Zuletzt bearbeitet 10.11.2025 19:07:07

SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host.