CVE-2021-43462 |
|
Medium |
Apr 04, 2022 |
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the username parameter.
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the username parameter.
less...
|
0.51.3135
|
CVE-2021-43461 |
|
Medium |
Apr 04, 2022 |
Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the servername parameter.
Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the servername parameter.
less...
|
0.51.3135
|
CVE-2021-43459 |
|
Medium |
Apr 04, 2022 |
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the (1) domain and (2) path parameters.
A Cross Site Scripting (XSS) vulnerability exists in Rumble Mail Server 0.51.3135 via the (1) domain and (2) path parameters.
less...
|
0.51.3135
|
CVE-2021-43456 |
|
High |
Apr 04, 2022 |
An Unquoted Service Path vulnerablility exists in Rumble Mail Server 0.51.3135 via via a specially crafted file in the RumbleService executable service
more...
An Unquoted Service Path vulnerablility exists in Rumble Mail Server 0.51.3135 via via a specially crafted file in the RumbleService executable service path.
less...
|
0.51.3135
|
BDSA-2020-3900 |
|
High |
Dec 24, 2020 |
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `path` para
more...
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `path` parameter. An attacker can use this to execute malicious scripts in the context of a victim's browser, allowing the theft of session tokens, cookies and other sensitive information.
less...
|
|
BDSA-2020-3899 |
|
High |
Dec 24, 2020 |
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `domain` pa
more...
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `domain` parameter. An attacker can use this to execute malicious scripts in the context of a victim's browser, allowing the theft of session tokens, cookies and other sensitive information.
less...
|
|
BDSA-2020-3896 |
|
High |
Dec 24, 2020 |
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `servername
more...
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to a lack of sanitization of user-supplied input with the `servername` parameter. An attacker can use this to execute malicious scripts in the context of a victim's browser, allowing the theft of session tokens, cookies and other sensitive information.
less...
|
|
BDSA-2020-3759 |
|
Medium |
Dec 14, 2020 |
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to an absence of correct parameter input validation. A remote attacke
more...
Rumble Mail Server contains a stored cross-site scripting (XSS) vulnerability due to an absence of correct parameter input validation. A remote attacker could insert JavaScript code and steal a victim's session tokens, cookies, or other sensitive information.
less...
|
|
BDSA-2020-3663 |
|
High |
Dec 07, 2020 |
Rumble Mail Server contains an unquoted service path vulnerability. An attacker can take advantage of this to escalate their privileges.
Rumble Mail Server contains an unquoted service path vulnerability. An attacker can take advantage of this to escalate their privileges.
less...
|
|
BDSA-2017-1473 |
|
High |
Oct 31, 2017 |
Rumble is a mail server suite. It contains a stored cross-site scripting (*XSS*) vulnerability due to improper validation of user-supplied data. An att
more...
Rumble is a mail server suite. It contains a stored cross-site scripting (*XSS*) vulnerability due to improper validation of user-supplied data. An attacker can exploit this to include script code within the URL to steal the victim's session cookies and craft other attacks. The vulnerable parameter is `domain`.
An [example of exploitation](https://packetstormsecurity.com/files/140399/Rumble-Mail-Server-0.51.3135-Cross-Site-Scripting.html) is available.
less...
|
|