A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311.
References
Configurations
No configuration.
History
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MailCleaner/MailCleaner/pull/601 - | |
References | () https://modzero.com/en/advisories/mz-24-01-mailcleaner/ - | |
References | () https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf - | |
References | () https://vuldb.com/?ctiid.262311 - | |
References | () https://vuldb.com/?id.262311 - |
14 May 2024, 15:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-29 07:15
Updated : 2024-11-21 09:29
NVD link : CVE-2024-3195
Mitre link : CVE-2024-3195
CVE.ORG link : CVE-2024-3195
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')