Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in the administration console in Secure Computing CipherTrust IronMail 6.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) network, (2) defRouterIp, (3) hostName, (4) domainName, (5) ipAddress, (6) defaultRouter, (7) dns1, or (8) dns2 parameter to (a) admin/system_IronMail.do; the (9) ipAddress parameter to (b) admin/systemOutOfBand.do; the (10) password or (11) confirmPassword parameter to (c) admin/systemBackup.do; the (12) Klicense parameter to (d) admin/systemLicenseManager.do; the (13) rows[1].attrValueStr or (14) rows[2].attrValueStr parameter to (e) admin/systemWebAdminConfig.do; the (15) rows[0].attrValueStr, rows[1].attrValueStr, (16) rows[2].attrValue, or (17) rows[2].attrValueStrClone parameter to (f) admin/ldap_ConfigureServiceProperties.do; the (18) input1 parameter to (g) admin/mailFirewall_MailRoutingInternal.do; or the (19) rows[2].attrValueStr, (20) rows[3].attrValueStr, (21) rows[5].attrValueStr, or (22) rows[6].attrValueStr parameter to (h) admin/mailIdsConfig.do.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Secure Computing CipherTrust IronMail 管理控制台 多个跨站脚本攻击漏洞
Vulnerability Description
Secure Computing CipherTrust IronMail 6.1.1版本的管理控制台中存在多个跨站脚本攻击漏洞。远程攻击者可以借助提交到(a)admin/system_IronMail.do的(1)网络,(2)defRouterIp,(3)主机名,(4)域名,(5)ip地址,(6)默认路由器,(7)dns1或(8)dns2参数;到(b)admin/systemOutOfBand.do的(9)ip地址参数;到(c)admin/systemBackup.do的(10)密码或(11)密码确认参
CVSS Information
N/A
Vulnerability Type
N/A