HGiga MailSherlock’s specific function has insufficient filtering for user input. An unauthenticated remote attacker can exploit this vulnerability to inject JavaScript, conducting a reflected XSS attack.
Metrics
Affected Vendors & Products
Fixes
Solution
Update MailSherlock packages version to iSherlock-user-4.5-162.386 and iSherlock-antispam-4.5-168.386
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-6958-e1a8e-1.html |
![]() ![]() |
History
Wed, 19 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-02-19T16:07:44.653Z
Reserved: 2023-01-31T00:00:00.000Z
Link: CVE-2023-24839

Updated: 2024-08-02T11:03:19.269Z

Status : Modified
Published: 2023-03-27T04:15:09.997
Modified: 2024-11-21T07:48:29.970
Link: CVE-2023-24839

No data.

No data.