CVE-2016-1142
high-risk
Published 2016-01-16
Seeds acmailer before 3.8.21 and 3.9.x before 3.9.15 Beta allows remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Do I need to act?
-
0.70% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (15)
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Acmailer
Affected Vendors
References (6)
Vendor Advisory
http://jvn.jp/en/jp/JVN50899877/index.html
Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002
Vendor Advisory
http://www.acmailer.jp/info/de.cgi?id=64
Vendor Advisory
http://jvn.jp/en/jp/JVN50899877/index.html
Vendor Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000002
Vendor Advisory
http://www.acmailer.jp/info/de.cgi?id=64
51
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
2/34 · Minimal
Exposure
18/34 · Moderate