Webmail Pro
by Afterlogic
Review your setup
Webmail Pro has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
66.7%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 3 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2021-26294 | 7.5 | 92.5% | — |
| CVE-2021-26293 | 9.8 | 50.7% | — |
| CVE-2019-19129 | 6.1 | 0.2% | — |
42
/ 100
moderate-risk
Active Threat
42/50 · Critical
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.