Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12191 | The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below. |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Proofpoint
Published:
Updated: 2025-02-28T18:28:42.806Z
Reserved: 2023-01-05T19:17:28.968Z
Link: CVE-2023-0090
Updated: 2024-08-02T05:02:42.973Z
Status : Modified
Published: 2023-03-08T01:15:10.343
Modified: 2024-11-21T07:36:32.103
Link: CVE-2023-0090
No data.
OpenCVE Enrichment
No data.
EUVD