[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-21827":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":41},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":38,"name":39,"published":40,"updated":27},21827,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":27,"risk_description":28,"public_description":29,"public_recommendation":30,"recommendation":27,"references":31,"cvssv3":27,"epss_score":33,"epss_percentile":34,"cve":35,"in_cisa_catalog":37,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user, steal cookie-based authentication credentials, and influence how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.","FormMail is prone to an HTTP response splitting vulnerability and multiple cross-site scripting (XSS) vulnerabilities because it fails to properly sanitize user-supplied input.","Upgrade to the latest version.",[32],"http://www.securityfocus.com/bid/34929",0.00195,0.41485,[36],"CVE-2009-1776",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.100202","Matt Wright FormMail HTTP Response Splitting and XSS Vulnerabilities","2018-01-02T00:00:00Z",["Island",42],{"key":43,"params":44,"result":46},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":45},"{\"text-color\":\"gray\"}",{"head":47},{}]