Lucene search

K
McafeeEmail Gateway

5 matches found

CVE
CVE
added 2013/12/13 6:7 p.m.37 views

CVE-2013-7092

Multiple SQL injection vulnerabilities in /admin/cgi-bin/rpc/doReport/18 in McAfee Email Gateway 7.6 allow remote authenticated users to execute arbitrary SQL commands via the (1) events_col, (2) event_id, (3) reason, (4) events_order, (5) emailstatus_order, or (6) emailstatus_col JSON keys.

6.5CVSS8.1AI score0.00474EPSS
CVE
CVE
added 2012/08/22 10:42 a.m.36 views

CVE-2012-4581

McAfee Email and Web Security (EWS) 5.x before 5.5 Patch 6 and 5.6 before Patch 3, and McAfee Email Gateway (MEG) 7.0 before Patch 1, does not disable the server-side session token upon the closing of the Management Console/Dashboard, which makes it easier for remote attackers to hijack sessions by...

6.8CVSS6.9AI score0.00365EPSS
CVE
CVE
added 2016/04/06 6:59 p.m.35 views

CVE-2016-3969

Cross-site scripting (XSS) vulnerability in McAfee Email Gateway (MEG) 7.6.x before 7.6.404, when File Filtering is enabled with the action set to ESERVICES:REPLACE, allows remote attackers to inject arbitrary web script or HTML via an attachment in a blocked email.

6.1CVSS6AI score0.0025EPSS
CVE
CVE
added 2017/03/14 10:59 p.m.34 views

CVE-2016-8005

File extension filtering vulnerability in Intel Security McAfee Email Gateway (MEG) before 7.6.404h1128596 allows attackers to fail to identify the file name properly via scanning an email with a forged attached filename that uses a null byte within the filename extension.

6.5CVSS6.3AI score0.00219EPSS
CVE
CVE
added 2010/05/28 8:30 p.m.31 views

CVE-2010-2116

The web interface in McAfee Email Gateway (formerly IronMail) 6.7.1 allows remote authenticated users, with only Read privileges, to gain Write privileges to modify configuration via the save action in a direct request to admin/systemWebAdminConfig.do.

6.5CVSS6.7AI score0.00546EPSS