Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Seppmail
Seppmail secure Email Gateway |
|
| Vendors & Products |
Seppmail
Seppmail secure Email Gateway |
Fri, 08 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 08 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SEPPmail Secure Email Gateway before version 15.0.2.1 allows unauthenticated remote code execution in the new GINA UI because an endpoint passes attacker-controlled input from a parameter to Perl's eval. | |
| Title | Unauthenticated Remote Code Execution | |
| Weaknesses | CWE-95 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-05-13T08:25:10.048Z
Reserved: 2026-05-05T12:56:43.132Z
Link: CVE-2026-44128
Updated: 2026-05-08T14:18:14.124Z
Status : Deferred
Published: 2026-05-08T14:16:45.870
Modified: 2026-05-08T15:51:08.590
Link: CVE-2026-44128
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z