Metrics
Affected Vendors & Products
No advisories yet.
Solution
Users and administrators of affected product versions are advised to update to SmarterMail version Build 9413 immediately.
Workaround
No workaround given by the vendor.
Mon, 29 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smartertools
Smartertools smartermail |
|
| Vendors & Products |
Smartertools
Smartertools smartermail |
Mon, 29 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
ssvc
|
Mon, 29 Dec 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution. | |
| Title | Upload Arbitrary Files | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-12-29T16:47:54.633Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52691
Updated: 2025-12-29T16:47:49.589Z
Status : Awaiting Analysis
Published: 2025-12-29T03:15:42.837
Modified: 2025-12-29T17:15:45.157
Link: CVE-2025-52691
No data.
OpenCVE Enrichment
Updated: 2025-12-29T22:33:10Z