Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AspEmail 5.6.0.2 contains a binary permission vulnerability that allows local users to escalate privileges through the Persits Software EmailAgent service. Attackers can exploit full write permissions in the BIN directory to replace the service executable and gain elevated system access. | |
| Title | AspEmail 5.6.0.2 Local Privilege Escalation via Binary Permission Vulnerability | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-19T21:52:30.727Z
Reserved: 2025-12-16T19:22:09.998Z
Link: CVE-2023-53949
Updated: 2025-12-19T21:52:17.072Z
Status : Received
Published: 2025-12-19T21:15:50.397
Modified: 2025-12-19T21:15:50.397
Link: CVE-2023-53949
No data.
OpenCVE Enrichment
No data.