McAfee Email Gateway (MEG) 7.6.3

CPE Details

McAfee Email Gateway (MEG) 7.6.3
7.6.3
2015-02-18
15h30 +00:00
2015-02-18
15h40 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:mcafee:email_gateway:7.6.3:*:*:*:*:*:*:*

Informations

Vendor

mcafee

Product

email_gateway

Version

7.6.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-7268 2020-09-15 23h20 +00:00 Path Traversal vulnerability in McAfee McAfee Email Gateway (MEG) prior to 7.6.406 allows remote attackers to traverse the file system to access files or directories that are outside of the restricted directory via external input to construct a path name that should be within a restricted directory.
4.3
Medium
CVE-2016-8005 2017-03-14 21h00 +00:00 File extension filtering vulnerability in Intel Security McAfee Email Gateway (MEG) before 7.6.404h1128596 allows attackers to fail to identify the file name properly via scanning an email with a forged attached filename that uses a null byte within the filename extension.
6.5
Medium
CVE-2016-3969 2016-04-06 16h00 +00:00 Cross-site scripting (XSS) vulnerability in McAfee Email Gateway (MEG) 7.6.x before 7.6.404, when File Filtering is enabled with the action set to ESERVICES:REPLACE, allows remote attackers to inject arbitrary web script or HTML via an attachment in a blocked email.
6.1
Medium
CVE-2015-1619 2015-02-17 15h00 +00:00 Cross-site scripting (XSS) vulnerability in the Secure Web Mail Client user interface in McAfee Email Gateway (MEG) 7.6.x before 7.6.3.2, 7.5.x before 75.6, 7.0.x through 7.0.5, 5.6, and earlier allows remote authenticated users to inject arbitrary web script or HTML via unspecified tokens in Digest messages.
3.5
CVE-2009-1348 2009-04-30 18h00 +00:00 The AV engine before DAT 5600 in McAfee VirusScan, Total Protection, Internet Security, SecurityShield for Microsoft ISA Server, Security for Microsoft Sharepoint, Security for Email Servers, Email Gateway, and Active Virus Defense allows remote attackers to bypass virus detection via (1) an invalid Headflags field in a malformed RAR archive, (2) an invalid Packsize field in a malformed RAR archive, or (3) an invalid Filelength field in a malformed ZIP archive.
7.6