Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Rockliffe Subscribe
Filtered by product Mailsite Express
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2005-3428 1 Rockliffe 1 Mailsite Express 2017-10-10 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to inject arbitrary web script or HTML via a message body.
CVE-2005-3430 1 Rockliffe 1 Mailsite Express 2017-07-10 7.5 HIGH N/A
Incomplete blacklist vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions, such as (1) .unk, (2) .asa, and possibly (3) .htr and (4) .aspx, which are not filtered like the .asp extension.
CVE-2005-3431 1 Rockliffe 1 Mailsite Express 2017-07-10 5.0 MEDIUM N/A
Absolute path traversal vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to read arbitrary files via a full pathname in the AttachPath field of a mail message under composition.
CVE-2005-3429 1 Rockliffe 1 Mailsite Express 2017-07-10 4.3 MEDIUM N/A
Rockliffe MailSite Express before 6.1.22, with the option to save login information enabled, saves user passwords in plaintext in cookies, which allows local users to obtain passwords by reading the cookie file, or remote attackers to obtain the cookies via cross-site scripting (XSS) vulnerabilities.
CVE-2005-3287 1 Rockliffe 1 Mailsite Express 2008-09-05 5.0 MEDIUM N/A
Incomplete blacklist vulnerability in Mailsite Express allows remote attackers to upload and possibly execute files via attachments with executable extensions such as ASPX, which are not converted to .TXT like other dangerous extensions, and which can be directly requested from the cache directory.
CVE-2005-3288 1 Rockliffe 1 Mailsite Express 2008-09-05 5.0 MEDIUM N/A
Mailsite Express allows remote attackers to upload and execute files with executable extensions such as ASP by attaching the file using the "compose page" feature, then accessing the file from the cache directory before saving or sending the message.