[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-3218":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":45},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":42,"name":43,"published":44,"updated":27},3218,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":35,"epss_score":36,"epss_percentile":37,"cve":38,"in_cisa_catalog":40,"date":41,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"medium","Attackers can execute arbitrary JavaScript in victims' browsers, potentially stealing session cookies, credentials, or performing actions on behalf of users.","IceWarp WebMail 11.3.1.5 is vulnerable to cross-site scripting via the language parameter.","Apply the latest security patch or upgrade to a non-vulnerable version of IceWarp WebMail.",[33,34],"https://technical.nttsecurity.com/post/102eegq/cookies-are-delicious","https://nvd.nist.gov/vuln/detail/CVE-2017-7855",6.1,0.00545,0.67753,[39],"CVE-2017-7855",false,"2017-08-31T00:00:00Z","NETSCAN-NUCLEI-CVE-CVE-2017-7855","IceWarp WebMail 11.3.1.5 - Cross-Site Scripting","2023-11-24T00:00:00Z",["Island",46],{"key":47,"params":48,"result":50},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":49},"{\"text-color\":\"gray\"}",{"head":51},{}]