Sonicwall

Email Security

15 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 31.03.2026 20:19:38
  • Zuletzt bearbeitet 13.04.2026 15:26:04

A vulnerability exists in the SonicWall Email Security appliance due to improper input sanitization that may lead to data corruption, allowing a remote authenticated attacker as admin user could exploit this issue by providing crafted input that corr...

  • EPSS 0.17%
  • Veröffentlicht 31.03.2026 20:18:32
  • Zuletzt bearbeitet 13.04.2026 16:49:49

A denial-of-service (DoS) vulnerability exists due to improper input validation in the SonicWall Email Security appliance, allowing a remote authenticated attacker as admin user to cause the application to become unresponsive.

  • EPSS 0.05%
  • Veröffentlicht 31.03.2026 20:17:11
  • Zuletzt bearbeitet 13.04.2026 16:50:20

A stored Cross-Site Scripting (XSS) vulnerability has been identified in the SonicWall Email Security appliance due to improper neutralization of user-supplied input during web page generation, allowing a remote authenticated attacker as admin user t...

Medienbericht
  • EPSS 0.04%
  • Veröffentlicht 20.11.2025 12:19:17
  • Zuletzt bearbeitet 12.12.2025 15:43:42

A Path Traversal vulnerability has been identified in the Email Security appliance allows an attacker to manipulate file system paths by injecting crafted directory-traversal sequences (such as ../) and may access files and directories outside the in...

Medienbericht
  • EPSS 0.03%
  • Veröffentlicht 20.11.2025 12:17:14
  • Zuletzt bearbeitet 12.12.2025 15:44:04

Download of Code Without Integrity Check Vulnerability in the SonicWall Email Security appliance loads root filesystem images without verifying signatures, allowing attackers with VMDK or datastore access to modify system files and gain persistent ar...

  • EPSS 0.22%
  • Veröffentlicht 14.03.2024 04:15:09
  • Zuletzt bearbeitet 15.04.2026 00:35:42

An improper Limitation of a Pathname to a Restricted Directory (Path Traversal) vulnerability in SonicWall Email Security Appliance could allow a remote attacker with administrative privileges to conduct a directory traversal attack and delete arbitr...

  • EPSS 0.38%
  • Veröffentlicht 14.02.2023 03:15:09
  • Zuletzt bearbeitet 20.03.2025 21:15:16

SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses.

Warnung
  • EPSS 74.54%
  • Veröffentlicht 18.12.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:31:58

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service wh...

Warnung
  • EPSS 94.34%
  • Veröffentlicht 14.12.2021 19:15:07
  • Zuletzt bearbeitet 27.10.2025 17:35:56

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a n...

Warnung Exploit
  • EPSS 94.36%
  • Veröffentlicht 10.12.2021 10:15:09
  • Zuletzt bearbeitet 20.02.2026 16:15:59

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An atta...