CVE-2019-12926
Summary
| CVE | CVE-2019-12926 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-08 22:15:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access. |
Risk And Classification
Problem Types: CWE-862
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mailenable | Mailenable | All | All | All | All |
| Application | Mailenable | Mailenable | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.mailenable.com/Premium-ReleaseNotes.txt | CONFIRM | www.mailenable.com | Release Notes, Vendor Advisory |
| www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-i... | MISC | www.nccgroup.trust | Release Notes, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.