Headline
CVE-2020-27509: Home
Persistent XSS in Galaxkey Secure Mail Client in Galaxkey up to 5.6.11.5 allows an attacker to perform an account takeover by intercepting the HTTP Post request when sending an email and injecting a specially crafted XSS payload in the ‘subject’ field. The payload executes when the recipient logs into their mailbox.
YOUR DATA MAY NOT BE AS SAFE AS YOU THINK IT IS.
You’ve locked your internal data down like a safe.
But what happens if the contents of that “safe” – emails, files, contracts, messages – get broken into? Or sent outside your business?
With Galaxkey’s three levels of identity-based encryption, you can protect all your data and communications, even when they leave your network.
So if and when your data falls into the wrong hands…
All they’ll find are feathers in the safe.