Page 8 of 44 results (0.005 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

The Proofpoint Insider Threat Management Server (formerly ObserveIT Server) before 7.9.1 contains a vulnerability in the ITM application server's WriteWindowMouse API. The vulnerability allows an anonymous remote attacker to execute arbitrary code with local administrator privileges. The vulnerability is caused by improper deserialization. Proofpoint Insider Threat Management Server (anteriormente ObserveIT Server) versiones anteriores a 7.9.1, contiene una vulnerabilidad en la API WriteWindowMouse del servidor de aplicaciones de ITM. La vulnerabilidad permite que un atacante remoto anónimo ejecutar código arbitrario con privilegios de administrador local. • https://www.proofpoint.com/us/blog https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0003 • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Proofpoint Email Protection through 2019-09-08. By collecting scores from Proofpoint email headers, it is possible to build a copy-cat Machine Learning Classification model and extract insights from this model. The insights gathered allow an attacker to craft emails that receive preferable scores, with a goal of delivering malicious emails. Se detectó un problema en Proofpoint Email Protection hasta el 08-09-2019. Mediante la recopilación de puntajes de los encabezados de correo electrónico de Proofpoint, es posible construir un modelo Machine Learning Classification copy-cat y extraer información de este modelo. • https://github.com/moohax/Proof-Pudding https://github.com/moohax/Talks/blob/master/slides/DerbyCon19.pdf https://www.proofpoint.com/us/security/CVE-2019-20634 https://www.proofpoint.com/us/security/security-advisories/pfpt-sn-2020-0001 • CWE-697: Incorrect Comparison •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

A file-extension filtering vulnerability in Proofpoint Enterprise Protection (PPS / PoD), in the unpatched versions of PPS through 8.9.22 and 8.14.2 respectively, allows attackers to bypass protection mechanisms (related to extensions, MIME types, virus detection, and journal entries for transmitted files) by sending malformed (not RFC compliant) multipart email. Una vulnerabilidad de filtrado de extensiones de archivos en Proofpoint Enterprise Protection (PPS / PoD), en las versiones sin parches de PPS a través de 8.9.22 y 8.14.2 respectivamente, permite a los atacantes eludir los mecanismos de protección (relacionados con extensiones, tipos MIME, detección de virus y entradas de diario para archivos transmitidos) mediante el envío de correo electrónico multiparte con formato incorrecto (no compatible con RFC). • https://www.proofpoint.com/us/security/cve-2019-19680 https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0001 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

The mail-filter web interface in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allows remote attackers to bypass authentication via unspecified vectors. La interfaz web del correo web de Proofpoint Messaging Security Gateway v6.2.0.263:6.2.0.237 y anteriores en Proofpoint Protection Server v5.5.3, v5.5.4, v5.5.5, v6.0.2, v6.1.1 y v6.2.0 permite a atacantes remotos eludir la autenticación a través de vectores no especificados. • http://www.clearskies.net/documents/css-advisory-css1105-proofpoint.php http://www.kb.cert.org/vuls/id/790980 https://support.proofpoint.com/article.cgi?article_id=338413 • CWE-287: Improper Authentication •

CVSS: 6.8EPSS: 0%CPEs: 7EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in unspecified administrative modules in Proofpoint Messaging Security Gateway 6.2.0.263:6.2.0.237 and earlier in Proofpoint Protection Server 5.5.3, 5.5.4, 5.5.5, 6.0.2, 6.1.1, and 6.2.0 allow remote attackers to hijack the authentication of administrators via unknown vectors. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en módulos administrativos no especificados en Proofpoint Messaging Security Gateway v6.2.0.263:6.2.0.237 y anteriores en Proofpoint Protection Server v5.5.3, v5.5.4, v5.5.5, v6.0.2, v6.1.1, y v6.2.0, permite a atacantes remotos secuestrar la autenticación de los administradores a través de vectores desconocidos. • http://www.clearskies.net/documents/css-advisory-css1105-proofpoint.php http://www.kb.cert.org/vuls/id/790980 https://support.proofpoint.com/article.cgi?article_id=338413 • CWE-352: Cross-Site Request Forgery (CSRF) •