Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

SeppMail — Vulnerabilities & Security Advisories 24

Browse all 24 CVE security advisories affecting SeppMail. AI-powered Chinese analysis, POCs, and references for each vulnerability.

SEPPmail is an email security appliance designed to protect organizations from spam, viruses, and phishing through advanced filtering and encryption capabilities. Historically, its software architecture has exhibited significant security flaws, resulting in twenty-four recorded Common Vulnerabilities and Exposures. These vulnerabilities predominantly involve remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and improper access controls within the management interface. Notable incidents include critical flaws allowing unauthenticated attackers to execute arbitrary commands or bypass authentication mechanisms, potentially leading to full system compromise. The high volume of disclosed CVEs indicates persistent weaknesses in the product’s development lifecycle and patch management processes. Consequently, administrators are advised to maintain strict version control and apply security updates promptly to mitigate the risk of exploitation by threat actors targeting these known entry points.

Found 22 results / 24Clear Filters
Top products by SeppMail: Secure Email Gateway SEPPmail
CVE IDTitleCVSSSeverityPublished
CVE-2026-29136 CA Notification HTML Injection — Secure Email GatewayCWE-79 5.4AIMediumAI2026-04-02
CVE-2026-29139 GINA State Confusion Account Takeover — Secure Email GatewayCWE-288 9.8AICriticalAI2026-04-02
CVE-2026-29144 Unicode Subject Tags — Secure Email GatewayCWE-20 5.3AIMediumAI2026-04-02
CVE-2026-29143 S/MIME Decryption Impersonation — Secure Email GatewayCWE-20 8.2AIHighAI2026-04-02
CVE-2026-29138 PGP Decryption Sender LDAP Injection — Secure Email GatewayCWE-90 4.3AIMediumAI2026-04-02
CVE-2026-29131 PGP Decryption Recipient LDAP Injection — Secure Email GatewayCWE-90 6.5AIMediumAI2026-04-02
CVE-2026-29142 Plaintext secure-mail.html — Secure Email GatewayCWE-325 7.5AIHighAI2026-04-02
CVE-2026-29137 Long Subject Untagging — Secure Email GatewayCWE-20 5.3AIMediumAI2026-04-02
CVE-2026-29141 Bounded Subject Tag Sanitization — Secure Email GatewayCWE-20 5.3AIMediumAI2026-04-02
CVE-2026-29135 Webmail Password Tag Sanitization Bypass — Secure Email GatewayCWE-20 8.2AIHighAI2026-04-02
CVE-2026-29134 GINA Domain Switch — Secure Email GatewayCWE-807 5.3AIMediumAI2026-04-02
CVE-2026-29140 S/MIME Signature Additional Certificate — Secure Email GatewayCWE-295 7.5AIHighAI2026-04-02
CVE-2026-29133 UID Regex Bypass — Secure Email GatewayCWE-20 9.1AICriticalAI2026-04-02
CVE-2026-29132 ESWmail-Verify Bypass — Secure Email GatewayCWE-306 4.3AIMediumAI2026-04-02
CVE-2026-27441 PDF Password CMDi — Secure Email GatewayCWE-78 9.8AICriticalAI2026-03-04
CVE-2026-2748 S/MIME Certificate Subject Whitespace — Secure Email GatewayCWE-295 7.5AIHighAI2026-03-04
CVE-2026-27442 zip_attachments Path Traversal — Secure Email GatewayCWE-22 7.5AIHighAI2026-03-04
CVE-2026-27445 PGP Signature Reflection — Secure Email GatewayCWE-347 7.5AIHighAI2026-03-04
CVE-2026-27444 Header Email Address Parsing — Secure Email GatewayCWE-436 9.1AICriticalAI2026-03-04
CVE-2026-2747 PGP Mixed Plaintext and Encrypted Content — Secure Email GatewayCWE-200 5.3AIMediumAI2026-03-04
CVE-2026-27443 S/MIME Decryption Tag Sanitization Bypass — Secure Email GatewayCWE-20 7.5AIHighAI2026-03-04
CVE-2026-2746 Missing PGP Signature Tag — Secure Email GatewayCWE-347 5.3AIMediumAI2026-03-04

This page lists every published CVE security advisory associated with SeppMail. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.