Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
proofpoint enterprise protection 8.18.6 vulnerabilities and exploits
(subscribe to this query)
5.4
CVSSv3
CVE-2023-5770
Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated malicious user to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding ...
Proofpoint Enterprise Protection 8.20.0
Proofpoint Enterprise Protection 8.18.6
Proofpoint Enterprise Protection 8.20.2
6.1
CVSSv3
CVE-2023-5771
Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages. This issue affects Proofpoint Enterprise Protection: ...
Proofpoint Enterprise Protection 8.20.0
Proofpoint Enterprise Protection 8.18.6
Proofpoint Enterprise Protection
8.8
CVSSv3
CVE-2023-0089
The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'. This affects all versions 8.20.0 and below.
Proofpoint Enterprise Protection 8.20.0
Proofpoint Enterprise Protection 8.18.6
Proofpoint Enterprise Protection
9.8
CVSSv3
CVE-2023-0090
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard config...
Proofpoint Enterprise Protection 8.20.0
Proofpoint Enterprise Protection 8.18.6
Proofpoint Enterprise Protection
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started