mailcleaner CVE Vulnerabilities & Metrics

Focus on mailcleaner vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About mailcleaner Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with mailcleaner. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total mailcleaner CVEs: 9
Earliest CVE date: 24 Oct 2018, 21:29 UTC
Latest CVE date: 29 Apr 2024, 07:15 UTC

Latest CVE reference: CVE-2024-3196

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 6

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical mailcleaner CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.73

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 6
7.0-8.9 0
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS mailcleaner CVEs

These are the five CVEs with the highest CVSS scores for mailcleaner, sorted by severity first and recency.

All CVEs for mailcleaner

CVE-2024-3196 mailcleaner vulnerability CVSS: 6.5 29 Apr 2024, 07:15 UTC

A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects the function getStats/Services_silentDump/Services_stopStartMTA/Config_saveDateTime/Config_hostid/Logs_StartGetStat/dumpConfiguration of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312.

CVE-2024-3195 mailcleaner vulnerability CVSS: 5.8 29 Apr 2024, 07:15 UTC

A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311.

CVE-2024-3194 mailcleaner vulnerability CVSS: 5.0 29 Apr 2024, 07:15 UTC

A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability.

CVE-2024-3193 mailcleaner vulnerability CVSS: 10.0 29 Apr 2024, 07:15 UTC

A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.

CVE-2024-3192 mailcleaner vulnerability CVSS: 5.0 29 Apr 2024, 07:15 UTC

A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation as part of Mail Message leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308.

CVE-2024-3191 mailcleaner vulnerability CVSS: 10.0 29 Apr 2024, 07:15 UTC

A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307.

CVE-2019-1010246 mailcleaner vulnerability CVSS: 5.0 18 Jul 2019, 19:15 UTC

MailCleaner before c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9 is affected by: Unauthenticated MySQL database password information disclosure. The impact is: MySQL database content disclosure (e.g. username, password). The component is: The API call in the function allowAction() in NewslettersController.php. The attack vector is: HTTP Get request. The fixed version is: c888fbb6aaa7c5f8400f637bcf1cbb844de46cd9.

CVE-2018-20323 mailcleaner vulnerability CVSS: 9.0 21 Mar 2019, 16:00 UTC

www/soap/application/MCSoap/Logs.php in MailCleaner Community Edition 2018.08 allows remote attackers to execute arbitrary OS commands.

CVE-2018-18635 mailcleaner vulnerability CVSS: 4.3 24 Oct 2018, 21:29 UTC

www/guis/admin/application/controllers/UserController.php in the administration login interface in MailCleaner CE 2018.08 and 2018.09 allows XSS via the admin/login/user/message/ PATH_INFO.