Metrics
Affected Vendors & Products
Wed, 13 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version) Canon Marketing Japan guardianwall Mailsuite (on-premises Version) |
|
| Vendors & Products |
Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version) Canon Marketing Japan guardianwall Mailsuite (on-premises Version) |
Wed, 13 May 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Overflow in GUARDIANWALL MailSuite Web Service Enables Remote Code Execution |
Wed, 13 May 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T10:49:48.622Z
Reserved: 2026-05-11T00:11:34.095Z
Link: CVE-2026-32661
Updated: 2026-05-13T10:48:17.002Z
Status : Deferred
Published: 2026-05-13T06:16:14.253
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-32661
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:34:50Z