Логотип exploitDog
bind:CVE-2019-17123
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-17123

Количество 2

Количество 2

nvd логотип

CVE-2019-17123

около 6 лет назад

The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-pmmq-6pp3-rf2g

больше 3 лет назад

The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-17123

The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

CVSS3: 7.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-pmmq-6pp3-rf2g

The eGain Web Email API 11+ allows spoofed messages because the fromName and message fields (to /system/ws/v11/ss/email) are mishandled, as demonstrated by fromName header injection with a %0a or %0d character. (Also, the message parameter can have initial HTML comment characters.)

CVSS3: 7.5
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу