Vulnerabilities (CVE)

Filtered by vendor Mailcleaner Subscribe
Filtered by product Mailcleaner
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-3191 1 Mailcleaner 1 Mailcleaner 2025-04-11 10.0 HIGH 9.8 CRITICAL
A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307.
CVE-2024-3196 1 Mailcleaner 1 Mailcleaner 2025-04-11 6.5 MEDIUM 6.7 MEDIUM
A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312.
CVE-2024-3194 1 Mailcleaner 1 Mailcleaner 2025-04-11 5.0 MEDIUM 4.3 MEDIUM
A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability.
CVE-2024-3192 1 Mailcleaner 1 Mailcleaner 2025-04-10 5.0 MEDIUM 4.3 MEDIUM
A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation as part of Mail Message leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308.
CVE-2024-3193 1 Mailcleaner 1 Mailcleaner 2025-04-10 10.0 HIGH 8.8 HIGH
A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.
CVE-2024-3195 1 Mailcleaner 1 Mailcleaner 2025-04-10 5.8 MEDIUM 4.7 MEDIUM
A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311.
CVE-2019-1010246 1 Mailcleaner 1 Mailcleaner 2024-11-21 5.0 MEDIUM 7.5 HIGH
MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9.
CVE-2018-20323 1 Mailcleaner 1 Mailcleaner 2024-11-21 9.0 HIGH 8.8 HIGH
www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands.
CVE-2018-18635 1 Mailcleaner 1 Mailcleaner 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO.