Vulnerabilities (CVE)

Filtered by vendor Proofpoint Subscribe
Total 42 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5770 1 Proofpoint 1 Enterprise Protection 2024-01-18 N/A 5.4 MEDIUM
Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.This issue affects Proofpoint Enterprise Protection: from 8.20.2 before patch 4809, from 8.20.0 before patch 4805, from 8.18.6 before patch 4804 and all other prior versions.
CVE-2023-4801 1 Proofpoint 1 Insider Threat Management 2023-12-10 N/A 7.5 HIGH
An improper certification validation vulnerability in the Insider Threat Management (ITM) Agent for MacOS could be used by an anonymous actor on an adjacent network to establish a man-in-the-middle position between the agent and the ITM server after the agent has registered. All versions prior to 7.14.3.69 are affected. Agents for Windows, Linux, and Cloud are unaffected.
CVE-2023-5771 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 6.1 MEDIUM
Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages.  This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.
CVE-2023-4828 1 Proofpoint 1 Insider Threat Management 2023-12-10 N/A 4.2 MEDIUM
An improper check for an exceptional condition in the Insider Threat Management (ITM) Server could be used by an attacker to change the server's configuration of any already-registered agent so that the agent sends all future communications to an attacker-chosen URL. This could result in disclosure of sensitive data events from the agent about the personally identifiable information (PII) and intellectual property it monitors, and all such data could be altered or deleted before reaching the ITM Server. An attacker must first successfully obtain valid agent credentials and agent hostname. All versions prior to 7.14.3.69 are affected.
CVE-2023-4802 1 Proofpoint 1 Insider Threat Management 2023-12-10 N/A 4.8 MEDIUM
A reflected cross-site scripting vulnerability in the UpdateInstalledSoftware endpoint of the Insider Threat Management (ITM) Server's web console could be used by an authenticated administrator to run arbitrary javascript within another web console administrator's browser. All versions prior to 7.14.3.69 are affected.
CVE-2023-4803 1 Proofpoint 1 Insider Threat Management 2023-12-10 N/A 4.8 MEDIUM
A reflected cross-site scripting vulnerability in the WriteWindowTitle endpoint of the Insider Threat Management (ITM) Server's web console could be used by an authenticated administrator to run arbitrary javascript within another web console administrator's browser. All versions prior to 7.14.3.69 are affected.
CVE-2023-36002 1 Proofpoint 1 Insider Threat Management Server 2023-12-10 N/A 4.3 MEDIUM
A missing authorization check in multiple URL validation endpoints of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to smuggle content via DNS lookups. All versions before 7.14.3 are affected.
CVE-2023-2819 1 Proofpoint 1 Threat Response Auto Pull 2023-12-10 N/A 4.3 MEDIUM
A stored cross-site scripting vulnerability in the Sources UI in Proofpoint Threat Response/ Threat Response Auto Pull (PTR/TRAP) could allow an authenticated administrator on an adjacent network to replace the image file with an arbitrary MIME type. ?This could result in arbitrary javascript code execution in an admin context.?All versions prior to 5.10.0 are affected.? 
CVE-2023-2818 1 Proofpoint 1 Insider Threat Management 2023-12-10 N/A 5.5 MEDIUM
An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected.
CVE-2023-36000 2 Apple, Proofpoint 2 Macos, Insider Threat Management Server 2023-12-10 N/A 6.5 MEDIUM
A missing authorization check in the MacOS agent configuration endpoint of the Insider Threat Management Server enables an anonymous attacker on an adjacent network to obtain sensitive information. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.
CVE-2023-35998 1 Proofpoint 1 Insider Threat Management Server 2023-12-10 N/A 4.6 MEDIUM
A missing authorization check in multiple SOAP endpoints of the Insider Threat Management Server enables an attacker on an adjacent network to read and write unauthorized objects. Successful exploitation requires an attacker to first obtain a valid agent authentication token. All versions before 7.14.3 are affected.
CVE-2023-2820 1 Proofpoint 1 Threat Response Auto Pull 2023-12-10 N/A 6.8 MEDIUM
An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected. 
CVE-2021-31608 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 4.3 MEDIUM
Proofpoint Enterprise Protection before 18.8.0 allows a Bypass of a Security Control.
CVE-2023-0090 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 9.8 CRITICAL
The webservices in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows for an anonymous user to execute remote code through 'eval injection'. Exploitation requires network access to the webservices API, but such access is a non-standard configuration. This affects all versions 8.20.0 and below.
CVE-2022-46334 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 7.8 HIGH
Proofpoint Enterprise Protection (PPS/PoD) contains a vulnerability which allows the pps user to escalate to root privileges due to unnecessary permissions. This affects all versions 8.19.0 and below.
CVE-2022-46332 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 9.6 CRITICAL
The Admin Smart Search feature in Proofpoint Enterprise Protection (PPS/PoD) contains a stored cross-site scripting vulnerability that enables an anonymous email sender to gain admin privileges within the user interface. This affects all versions 8.19.0 and below.
CVE-2023-0089 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 8.8 HIGH
The webutils in Proofpoint Enterprise Protection (PPS/POD) contain a vulnerability that allows an authenticated user to execute remote code through 'eval injection'. This affects all versions 8.20.0 and below.
CVE-2022-46333 1 Proofpoint 1 Enterprise Protection 2023-12-10 N/A 7.2 HIGH
The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope. This affects all versions 8.19.0 and below.
CVE-2022-25294 2 Microsoft, Proofpoint 2 Windows, Insider Threat Management 2023-12-10 7.2 HIGH 7.8 HIGH
Proofpoint Insider Threat Management Agent for Windows relies on an inherently dangerous function that could enable an unprivileged local Windows user to run arbitrary code with SYSTEM privileges. All versions prior to 7.12.1 are affected. Agents for MacOS and Linux and Cloud are unaffected. Proofpoint has released fixed software version 7.12.1. The fixed software versions are available through the customer support portal.
CVE-2021-40843 1 Proofpoint 1 Insider Threat Management Server 2023-12-10 6.9 MEDIUM 7.3 HIGH
Proofpoint Insider Threat Management Server contains an unsafe deserialization vulnerability in the Web Console. An attacker with write access to the local database could cause arbitrary code to execute with SYSTEM privileges on the underlying server when a Web Console user triggers retrieval of that data. When chained with a SQL injection vulnerability, the vulnerability could be exploited remotely if Web Console users click a series of maliciously crafted URLs. All versions prior to 7.11.2 are affected.