First published: Mon Oct 23 2017(Updated: )
Cross-site scripting (XSS) vulnerability in actions.hsp in the Ajax WebMail interface in AXIGEN Mail Server before 9.0 allows remote attackers to inject arbitrary web script or HTML via an email attachment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Axigen Mail Server for Windows | =8.0 | |
Axigen Mail Server for Windows | =8.0.1 | |
Axigen Mail Server for Windows | =8.0.2 | |
Axigen Mail Server for Windows | =8.0.3 | |
Axigen Mail Server for Windows | =8.1.0 | |
Axigen Mail Server for Windows | =8.1.1 | |
Axigen Mail Server for Windows | =8.1.2 | |
Axigen Mail Server for Windows | =8.1.3 | |
Axigen Mail Server for Windows | =8.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5379 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute scripts in the context of a user's browser.
To mitigate CVE-2015-5379, it is recommended to upgrade to Axigen Mail Server version 9.0 or later, which addresses this vulnerability.
CVE-2015-5379 allows remote attackers to inject arbitrary web scripts or HTML via email attachments, leading to cross-site scripting (XSS) attacks.
CVE-2015-5379 affects various versions of Axigen Mail Server, including versions 8.0 to 8.2.0.
Organizations using vulnerable versions of Axigen Mail Server may be impacted, specifically those allowing user access to the Ajax WebMail interface.