First published: Thu Dec 31 2020(Updated: )
HGiga MailSherlock does not validate specific parameters properly. Attackers can use the vulnerability to launch Command inject attacks remotely and execute arbitrary commands of the system.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Hgiga Msr45 Isherlock-user | <4.5-115 | |
Hgiga Ssr45 Isherlock-user | <4.5-115 |
Update MailSherlock MSR45/SSR45 Module to iSherlock-user-4.5-115.i386.rpm
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2020-35851.
CVE-2020-35851 has a severity of 9.8, which is classified as critical.
HGiga MailSherlock versions 4.5-115 are affected by CVE-2020-35851.
Attackers can use the vulnerability to launch remote Command inject attacks and execute arbitrary commands on the system.
At the time of writing, there is no information available about a fix for CVE-2020-35851. It is recommended to follow the vendor's security advisories for any updates or patches.