Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 31 Dec 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canarymail:canary_mail:*:*:*:*:*:windows:*:* |
Wed, 17 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-693 | |
| Metrics |
cvssV3_1
|
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canarymail
Canarymail canary Mail Microsoft Microsoft windows |
|
| Vendors & Products |
Canarymail
Canarymail canary Mail Microsoft Microsoft windows |
Tue, 16 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When using the attachment interaction functionality, Canary Mail 5.1.40 and below saves documents to a file system without a Mark-of-the-Web tag, which allows attackers to bypass the built-in file protection mechanisms of both Windows OS and third-party software. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-17T18:52:10.925Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65318
Updated: 2025-12-17T18:48:31.320Z
Status : Analyzed
Published: 2025-12-16T16:15:59.673
Modified: 2025-12-31T00:38:32.100
Link: CVE-2025-65318
No data.
OpenCVE Enrichment
Updated: 2025-12-17T14:29:00Z