Filtered by vendor Proofpoint
Subscribe
Total
30 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-0090 | 1 Proofpoint | 1 Enterprise Protection | 2023-03-15 | N/A | 9.8 CRITICAL |
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below. | |||||
CVE-2023-0089 | 1 Proofpoint | 1 Enterprise Protection | 2023-03-15 | N/A | 8.8 HIGH |
The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'. This affects all versions 8.20.0 and below. | |||||
CVE-2022-46334 | 1 Proofpoint | 1 Enterprise Protection | 2023-01-03 | N/A | 7.8 HIGH |
Proofpoint Enterprise Protection (PPS/PoD) contains a vulnerability which allows the pps user to escalate to root privileges due to unnecessary permissions. This affects all versions 8.19.0 and below. | |||||
CVE-2022-46332 | 1 Proofpoint | 1 Enterprise Protection | 2022-12-09 | N/A | 9.6 CRITICAL |
The Admin Smart Search feature in Proofpoint Enterprise Protection (PPS/PoD) contains a stored cross-site scripting vulnerability that enables an anonymous email sender to gain admin privileges within the user interface. This affects all versions 8.19.0 and below. | |||||
CVE-2022-46333 | 1 Proofpoint | 1 Enterprise Protection | 2022-12-09 | N/A | 7.2 HIGH |
The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope. This affects all versions 8.19.0 and below. | |||||
CVE-2021-31608 | 1 Proofpoint | 1 Enterprise Protection | 2022-11-21 | N/A | 4.3 MEDIUM |
Proofpoint Enterprise Protection before 18.8.0 allows a Bypass of a Security Control. | |||||
CVE-2019-20634 | 1 Proofpoint | 1 Email Protection | 2022-04-27 | 4.3 MEDIUM | 3.7 LOW |
An issue was discovered in Proofpoint Email Protection through 2019-09-08. By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails. | |||||
CVE-2022-25294 | 2 Microsoft, Proofpoint | 2 Windows, Insider Threat Management | 2022-03-18 | 7.2 HIGH | 7.8 HIGH |
Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal. | |||||
CVE-2021-40842 | 1 Proofpoint | 1 Insider Threat Management Server | 2021-10-19 | 7.5 HIGH | 9.8 CRITICAL |
Proofpoint Insider Threat Management Server contains a SQL injection vulnerability in the Web Console. The vulnerability exists due to improper input validation on the database name parameter required in certain unauthenticated APIs. A malicious URL visited by anyone with network access to the server could be used to blindly execute arbitrary SQL statements on the backend database. Version 7.12.0 and all versions prior to 7.11.2 are affected. | |||||
CVE-2021-40843 | 1 Proofpoint | 1 Insider Threat Management Server | 2021-10-19 | 6.9 MEDIUM | 7.3 HIGH |
Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected. | |||||
CVE-2021-34814 | 1 Proofpoint | 1 Spam Engine | 2021-10-19 | 5.0 MEDIUM | 7.5 HIGH |
Proofpoint Spam Engine before 8.12.0-2106240000 has a Security Control Bypass. | |||||
CVE-2021-39304 | 1 Proofpoint | 1 Enterprise Protection | 2021-10-19 | 5.0 MEDIUM | 7.5 HIGH |
Proofpoint Enterprise Protection before 8.12.0-2108090000 allows security control bypass. | |||||
CVE-2020-14009 | 1 Proofpoint | 1 Enterprise Protection | 2021-05-19 | 6.8 MEDIUM | 6.3 MEDIUM |
Proofpoint Enterprise Protection (PPS/PoD) before 8.16.4 contains a vulnerability that could allow an attacker to deliver an email message with a malicious attachment that bypasses scanning and file-blocking rules. The vulnerability exists because messages with certain crafted and malformed multipart structures are not properly handled. | |||||
CVE-2021-22158 | 1 Proofpoint | 1 Insider Threat Management | 2021-04-12 | 6.5 MEDIUM | 7.2 HIGH |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is vulnerable to XML external entity (XXE) injection in the Web Console. The vulnerability requires admin user privileges and knowledge of the XML file's encryption key to successfully exploit. All versions before 7.11 are affected. | |||||
CVE-2021-22157 | 1 Proofpoint | 1 Insider Threat Management | 2021-04-12 | 4.3 MEDIUM | 6.1 MEDIUM |
Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.11.1 allows stored XSS. | |||||
CVE-2021-27899 | 1 Proofpoint | 1 Insider Threat Management | 2021-04-12 | 5.8 MEDIUM | 7.4 HIGH |
The Proofpoint Insider Threat Management Agents (formerly ObserveIT Agent) for MacOS and Linux perform improper validation of the ITM Server's certificate, which enables a remote attacker to intercept and alter these communications using a man-in-the-middle attack. All versions before 7.11.1 are affected. Agents for Windows and Cloud are not affected. | |||||
CVE-2021-27900 | 1 Proofpoint | 1 Insider Threat Management | 2021-04-12 | 5.5 MEDIUM | 8.1 HIGH |
The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) is missing an authorization check on several pages in the Web Console. This enables a view-only user to change any configuration setting and delete any registered agents. All versions before 7.11.1 are affected. | |||||
CVE-2019-19680 | 1 Proofpoint | 1 Enterprise Protection | 2021-03-04 | 6.8 MEDIUM | 8.8 HIGH |
A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email. | |||||
CVE-2021-22159 | 1 Proofpoint | 1 Insider Threat Management | 2021-02-04 | 7.2 HIGH | 7.8 HIGH |
Insider Threat Management Windows Agent Local Privilege Escalation Vulnerability The Proofpoint Insider Threat Management (formerly ObserveIT) Agent for Windows before 7.4.3, 7.5.4, 7.6.5, 7.7.5, 7.8.4, 7.9.3, 7.10.2, and 7.11.0.25 as well as versions 7.3 and earlier is missing authentication for a critical function, which allows a local authenticated Windows user to run arbitrary commands with the privileges of the Windows SYSTEM user. Agents for MacOS, Linux, and ITM Cloud are not affected. | |||||
CVE-2020-8884 | 1 Proofpoint | 1 Insider Threat Management | 2021-01-13 | 9.0 HIGH | 8.8 HIGH |
rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes. |