CVE-2024-22398
- EPSS 0.28%
- Veröffentlicht 14.03.2024 04:15:09
- Zuletzt bearbeitet 21.11.2024 08:56:12
An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitr...
CVE-2023-0655
- EPSS 0.17%
- Veröffentlicht 14.02.2023 03:15:09
- Zuletzt bearbeitet 20.03.2025 21:15:16
SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses.
CVE-2022-2324
- EPSS 0.11%
- Veröffentlicht 29.07.2022 21:15:09
- Zuletzt bearbeitet 21.11.2024 07:00:46
Improperly Implemented Security Check vulnerability in the SonicWall Hosted Email Security leads to bypass of Capture ATP security service in the appliance. This vulnerability impacts 10.0.17.7319 and earlier versions
CVE-2021-45105
- EPSS 65.66%
- Veröffentlicht 18.12.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:31:58
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service wh...
- EPSS 94.34%
- Veröffentlicht 14.12.2021 19:15:07
- Zuletzt bearbeitet 12.03.2025 19:52:00
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a n...
- EPSS 94.36%
- Veröffentlicht 10.12.2021 10:15:09
- Zuletzt bearbeitet 08.08.2025 18:52:00
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An atta...
CVE-2021-20023
- EPSS 58.89%
- Veröffentlicht 20.04.2021 12:15:12
- Zuletzt bearbeitet 14.03.2025 17:08:56
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to read an arbitrary file on the remote host.
CVE-2021-20021
- EPSS 92.17%
- Veröffentlicht 09.04.2021 18:15:13
- Zuletzt bearbeitet 14.03.2025 17:08:04
A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
CVE-2021-20022
- EPSS 46.26%
- Veröffentlicht 09.04.2021 18:15:13
- Zuletzt bearbeitet 30.07.2025 18:58:56
SonicWall Email Security version 10.0.9.x contains a vulnerability that allows a post-authenticated attacker to upload an arbitrary file to the remote host.
CVE-2021-3450
- EPSS 0.69%
- Veröffentlicht 25.03.2021 15:15:13
- Zuletzt bearbeitet 21.11.2024 06:21:33
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly ...