Описание
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Ссылки
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.03872
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
EPSS
Процентиль: 88%
0.03872
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other