CVE-2019-12926
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/07/2019
Last modified:
24/08/2020
Description
MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 6.0 (including) | 6.90 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 7.0 (including) | 7.62 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 8.00 (including) | 8.64 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 9.0 (including) | 9.83 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 10.00 (including) | 10.24 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



