Filtered by vendor Proofpoint
Subscribe
Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-39304 | 1 Proofpoint | 1 Enterprise Protection | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass. | |||||
CVE-2021-34814 | 1 Proofpoint | 1 Spam Engine | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
Proofpoint Spam Engine before 8.12.0-2106240000 has a Security Control Bypass. | |||||
CVE-2021-31608 | 1 Proofpoint | 1 Enterprise Protection | 2024-11-21 | N/A | 4.3 MEDIUM |
Proofpoint Enterprise Protection before 18.8.0 allows a Bypass of a Security Control. | |||||
CVE-2021-27900 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 5.5 MEDIUM | 8.1 HIGH |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected. | |||||
CVE-2021-27899 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 5.8 MEDIUM | 7.4 HIGH |
The Proofpoint Insider Threat Management Agents (formerly ObserveIT Agent) for MacOS and Linux perform improper validation of the ITM Server's certificate, which enables a remote attacker to intercept and alter these communications using a man-in-the-middle attack. All versions before 7.11.1 are affected. Agents for Windows and Cloud are not affected. | |||||
CVE-2021-22159 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 7.2 HIGH | 7.8 HIGH |
Insider Threat Management Windows Agent Local Privilege Escalation Vulnerability The Proofpoint Insider Threat Management (formerly ObserveIT) Agent for Windows before 7.4.3, 7.5.4, 7.6.5, 7.7.5, 7.8.4, 7.9.3, 7.10.2, and 7.11.0.25 as well as versions 7.3 and earlier is missing authentication for a critical function, which allows a local authenticated Windows user to run arbitrary commands with the privileges of the Windows SYSTEM user. Agents for MacOS, Linux, and ITM Cloud are not affected. | |||||
CVE-2021-22158 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is vulnerable to XML external entity (XXE) injection in the Web Console. The vulnerability requires admin user privileges and knowledge of the XML file's encryption key to successfully exploit. All versions before 7.11 are affected. | |||||
CVE-2021-22157 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.11.1 allows stored XSS. | |||||
CVE-2020-8884 | 1 Proofpoint | 1 Insider Threat Management | 2024-11-21 | 9.0 HIGH | 8.8 HIGH |
rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes. | |||||
CVE-2020-14009 | 1 Proofpoint | 1 Enterprise Protection | 2024-11-21 | 6.8 MEDIUM | 6.3 MEDIUM |
Proofpoint Enterprise Protection (PPS/PoD) before 8.16.4 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipart structures are not properly handled. | |||||
CVE-2020-10658 | 1 Proofpoint | 1 Insider Threat Management Server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteImage API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. | |||||
CVE-2020-10657 | 1 Proofpoint | 1 Insider Threat Management Server | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM web console's ImportAlertRules feature. The vulnerability allows a remote attacker (with admin or config-admin privileges in the console) to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. | |||||
CVE-2020-10656 | 1 Proofpoint | 1 Insider Threat Management Server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouseWithChunksV2 API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. | |||||
CVE-2020-10655 | 1 Proofpoint | 1 Insider Threat Management Server | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouse API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. | |||||
CVE-2019-20634 | 1 Proofpoint | 1 Email Protection | 2024-11-21 | 4.3 MEDIUM | 3.7 LOW |
An issue was discovered in Proofpoint Email Protection through 2019-09-08. By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails. | |||||
CVE-2019-19680 | 1 Proofpoint | 1 Enterprise Protection | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email. | |||||
CVE-2011-1905 | 1 Proofpoint | 2 Messaging Security Gateway, Protection Server | 2024-11-21 | 6.8 MEDIUM | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in unspecified administrative modules in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allow remote attackers to hijack the authentication of administrators via unknown vectors. | |||||
CVE-2011-1904 | 1 Proofpoint | 2 Messaging Security Gateway, Protection Server | 2024-11-21 | 7.5 HIGH | N/A |
An unspecified function in the web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to execute arbitrary commands via unknown vectors, related to a "command injection" issue. | |||||
CVE-2011-1903 | 1 Proofpoint | 2 Messaging Security Gateway, Protection Server | 2024-11-21 | 7.5 HIGH | N/A |
SQL injection vulnerability in an unspecified function in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to execute arbitrary SQL commands via unknown vectors. | |||||
CVE-2011-1902 | 1 Proofpoint | 2 Messaging Security Gateway, Protection Server | 2024-11-21 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to read arbitrary files via unspecified vectors. |