Browse all 3 CVE security advisories affecting OAKlouds. AI-powered Chinese analysis, POCs, and references for each vulnerability.
OAKlouds provides cloud infrastructure management solutions, enabling organizations to deploy and maintain scalable cloud environments. Historically, the platform has been susceptible to multiple vulnerability classes, including remote code execution, cross-site scripting, and privilege escalation vulnerabilities, as evidenced by its three recorded CVEs. While no major public security incidents have been widely reported, the presence of these vulnerabilities suggests potential weaknesses in input validation, access controls, and secure coding practices. Organizations utilizing OAKlouds should maintain rigorous patch management and security monitoring to mitigate risks associated with these common cloud security challenges.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2019-9882 | Multi modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to add malicious email sources into whitelist. — MailSherlock MSR35CWE-352 | 8.8 | - | 2019-06-03 |
| CVE-2019-9883 | Multi modules of MailSherlock MSR35 and MSR45 lead to a CSRF vulnerability. It allows attacker to elevate privilege of specific account. — MailSherlock MSR35CWE-352 | 8.8 | - | 2019-06-03 |
| CVE-2018-17542 | SQL Injection exists in MailSherlock before 1.5.235 for OAKlouds — MailSherlock | 7.5 | - | 2019-02-11 |
This page lists every published CVE security advisory associated with OAKlouds. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.