Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mailenable
Mailenable mailenable |
|
| Vendors & Products |
Mailenable
Mailenable mailenable |
Wed, 10 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAISP.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAISP.DLL, which is then loaded on execution, resulting in attacker-controlled code running with the privileges of the process. | |
| Title | MailEnable < 10.54 DLL Hijacking via Unsafe Loading of MEAISP.DLL | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-10T16:29:12.101Z
Reserved: 2025-04-15T19:15:22.600Z
Link: CVE-2025-34421
Updated: 2025-12-10T16:28:51.908Z
Status : Received
Published: 2025-12-10T16:16:25.713
Modified: 2025-12-10T16:16:25.713
Link: CVE-2025-34421
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:13Z