CVE-2024-32369
- EPSS 1.99%
- Veröffentlicht 07.05.2024 15:15:08
- Zuletzt bearbeitet 17.06.2025 20:17:46
SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the start and limit parameter in the mliWhiteList.php component.
CVE-2024-32370
- EPSS 3.49%
- Veröffentlicht 07.05.2024 15:15:08
- Zuletzt bearbeitet 17.06.2025 20:17:37
An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a remote attacker to obtain sensitive information via a crafted payload to the id parameter in the mliSystemUsers.php component.
CVE-2024-32371
- EPSS 0.73%
- Veröffentlicht 07.05.2024 15:15:08
- Zuletzt bearbeitet 17.06.2025 20:17:30
An issue in HSC Cybersecurity HC Mailinspector 5.2.17-3 through 5.2.18 allows a regular user account to escalate their privileges and gain administrative access by changing the type parameter from 1 to 0.
CVE-2024-34471
- EPSS 1.7%
- Veröffentlicht 06.05.2024 16:15:14
- Zuletzt bearbeitet 17.06.2025 17:13:49
An issue was discovered in HSC Mailinspector 5.2.17-3. A Path Traversal vulnerability (resulting in file deletion) exists in the mliRealtimeEmails.php file. The filename parameter in the export HTML functionality does not properly validate the file l...
CVE-2024-34470
- EPSS 92.99%
- Veröffentlicht 06.05.2024 15:15:24
- Zuletzt bearbeitet 17.06.2025 16:23:03
An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part ...
CVE-2024-34472
- EPSS 2.32%
- Veröffentlicht 06.05.2024 15:15:24
- Zuletzt bearbeitet 25.11.2025 15:15:47
An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An authenticated blind SQL injection vulnerability exists in the mliRealtimeEmails.php file. The ordemGrid parameter in a POST request to /mailinspector/mliRealtimeEmails.php doe...