A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312.
Metrics
Affected Vendors & Products
References
History
Fri, 21 Mar 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mailcleaner
Mailcleaner mailcleaner |
|
CPEs | cpe:2.3:a:mailcleaner:mailcleaner:*:*:*:*:community:*:*:* | |
Vendors & Products |
Mailcleaner
Mailcleaner mailcleaner |

Status: PUBLISHED
Assigner: VulDB
Published: 2024-04-29T06:22:44.534Z
Updated: 2024-08-01T20:05:07.551Z
Reserved: 2024-04-02T14:22:51.446Z
Link: CVE-2024-3196

Updated: 2024-08-01T20:05:07.551Z

Status : Analyzed
Published: 2024-04-29T07:15:08.740
Modified: 2025-03-21T17:05:48.507
Link: CVE-2024-3196

No data.