Описание
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.07 (включая)Версия до 1.62 (включая)Версия до 5.61 (включая)Версия до 5.61 (включая)
Одно из
cpe:2.3:a:northgrid:proself:*:*:*:*:mail_sanitize:*:*:*
cpe:2.3:a:northgrid:proself:*:*:*:*:gateway:*:*:*
cpe:2.3:a:northgrid:proself:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:northgrid:proself:*:*:*:*:standard:*:*:*
EPSS
Процентиль: 68%
0.00563
Низкий
7.2 High
CVSS3
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 7.2
github
больше 2 лет назад
Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
EPSS
Процентиль: 68%
0.00563
Низкий
7.2 High
CVSS3
Дефекты
CWE-78