Proself Enterprise/Standard Edition Ver5.61 and earlier, Proself Gateway Edition Ver1.62 and earlier, and Proself Mail Sanitize Edition Ver1.07 and earlier allow a remote authenticated attacker with an administrative privilege to execute arbitrary OS commands.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
North Grid Corporation
North Grid Corporation proself Enterprise Standard Edition North Grid Corporation proself Gateway Edition North Grid Corporation proself Mail Sanitize Edition |
|
CPEs | cpe:2.3:a:north_grid_corporation:proself_enterprise_standard_edition:*:*:*:*:*:*:*:* cpe:2.3:a:north_grid_corporation:proself_gateway_edition:*:*:*:*:*:*:*:* cpe:2.3:a:north_grid_corporation:proself_mail_sanitize_edition:*:*:*:*:*:*:*:* |
|
Vendors & Products |
North Grid Corporation
North Grid Corporation proself Enterprise Standard Edition North Grid Corporation proself Gateway Edition North Grid Corporation proself Mail Sanitize Edition |
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2023-08-18T09:26:31.152Z
Updated: 2024-10-09T14:10:56.901Z
Reserved: 2023-08-01T01:06:32.263Z
Link: CVE-2023-39416
Vulnrichment
Updated: 2024-08-02T18:10:20.822Z
NVD
Status : Analyzed
Published: 2023-08-18T10:15:11.887
Modified: 2023-08-23T16:48:22.340
Link: CVE-2023-39416
Redhat
No data.