Refine your search

3 vulnerabilities found for TransmitMail by TAGAWA Takao

jvndb-2022-000007
Vulnerability from jvndb
Published
2022-01-25 15:31
Modified
2022-01-25 15:31
Severity ?
Summary
Multiple vulnerabilities in TransmitMail
Details
TransmitMail is a PHP based mail form system. TransmitMail contains multiple vulnerabilities listed below. * Directory traversal vulnerability due to the improper validation of external input values (CWE-22) - CVE-2022-22146 * Cross-site scripting (CWE-79) - CVE-2022-21193 ishiyuriniwa reported these vulnerabilities to TAGAWA Takao and coordinated. TAGAWA Takao reported these vulnerabilities to IPA to notify users of the solution through JVN.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000007.html",
  "dc:date": "2022-01-25T15:31+09:00",
  "dcterms:issued": "2022-01-25T15:31+09:00",
  "dcterms:modified": "2022-01-25T15:31+09:00",
  "description": "TransmitMail is a PHP based mail form system. TransmitMail contains multiple vulnerabilities listed below.\r\n\r\n* Directory traversal vulnerability due to the improper validation of external input values (CWE-22) - CVE-2022-22146\r\n* Cross-site scripting (CWE-79) - CVE-2022-21193\r\n\r\nishiyuriniwa reported these vulnerabilities to TAGAWA Takao and coordinated.\r\nTAGAWA Takao reported these vulnerabilities to IPA to notify users of the solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000007.html",
  "sec:cpe": {
    "#text": "cpe:/a:dounokouno:transmitmail",
    "@product": "TransmitMail",
    "@vendor": "TAGAWA Takao",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2022-000007",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN70100915/index.html",
      "@id": "JVN#70100915",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-22146",
      "@id": "CVE-2022-22146",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-21193",
      "@id": "CVE-2022-21193",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-22146",
      "@id": "CVE-2022-22146",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-21193",
      "@id": "CVE-2022-21193",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-22",
      "@title": "Path Traversal(CWE-22)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "Multiple vulnerabilities in TransmitMail"
}

jvndb-2015-000055
Vulnerability from jvndb
Published
2015-04-23 14:12
Modified
2015-04-27 16:12
Severity ?
() - -
Summary
TransmitMail vulnerable to directory traversal
Details
TransmitMail is a PHP based mail form. TransmitMail contains an issue in processing file names, which may result in a directory traversal (CWE-22) vulnerability. Gen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000055.html",
  "dc:date": "2015-04-27T16:12+09:00",
  "dcterms:issued": "2015-04-23T14:12+09:00",
  "dcterms:modified": "2015-04-27T16:12+09:00",
  "description": "TransmitMail is a PHP based mail form. TransmitMail contains an issue in processing file names, which may result in a directory traversal (CWE-22) vulnerability.\r\n\r\nGen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.\r\n JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000055.html",
  "sec:cpe": {
    "#text": "cpe:/a:dounokouno:transmitmail",
    "@product": "TransmitMail",
    "@vendor": "TAGAWA Takao",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2015-000055",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN41653647/index.html",
      "@id": "JVN#41653647",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0911",
      "@id": "CVE-2015-0911",
      "@source": "CVE"
    },
    {
      "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0911",
      "@id": "CVE-2015-0911",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-22",
      "@title": "Path Traversal(CWE-22)"
    }
  ],
  "title": "TransmitMail vulnerable to directory traversal"
}

jvndb-2015-000054
Vulnerability from jvndb
Published
2015-04-23 13:47
Modified
2015-04-27 16:13
Severity ?
() - -
Summary
TransmitMail vulnerable to cross-site scripting
Details
TransmitMail is a PHP based mail form. TransmitMail contains a cross-site scripting (CWE-79) vulnerability due to the processing of file names. Gen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000054.html",
  "dc:date": "2015-04-27T16:13+09:00",
  "dcterms:issued": "2015-04-23T13:47+09:00",
  "dcterms:modified": "2015-04-27T16:13+09:00",
  "description": "TransmitMail is a PHP based mail form. TransmitMail contains a cross-site scripting (CWE-79) vulnerability due to the processing of file names.\r\n\r\nGen Sato of TRADE WORKS Co.,Ltd. Security Dept. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000054.html",
  "sec:cpe": {
    "#text": "cpe:/a:dounokouno:transmitmail",
    "@product": "TransmitMail",
    "@vendor": "TAGAWA Takao",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2015-000054",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN26860747/index.html",
      "@id": "JVN#26860747",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0910",
      "@id": "CVE-2015-0910",
      "@source": "CVE"
    },
    {
      "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0910",
      "@id": "CVE-2015-0910",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "TransmitMail vulnerable to cross-site scripting"
}