2024-05-18 23:58:22 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2024-28063",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2024-05-18T22:15:07.133",
|
2024-05-20 14:03:31 +00:00
|
|
|
"lastModified": "2024-05-20T13:00:04.957",
|
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2024-05-18 23:58:22 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "Kiteworks Totemomail through 7.0.0 allows /responsiveUI/EnvelopeOpenServlet envelopeRecipient reflected XSS."
|
2024-05-26 02:03:22 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
"lang": "es",
|
|
|
|
"value": "Kiteworks Totemomail hasta 7.0.0 permite /responsiveUI/EnvelopeOpenServlet envolventeRecipient XSS reflejado."
|
2024-05-18 23:58:22 +00:00
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://www.objectif-securite.ch/advisories/totemomail-reflected-xss.txt",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|