Описание
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
Ссылки
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
- ExploitVendor Advisory
- PatchVendor Advisory
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03549
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
poprelayd script before 2.0 in Cobalt RaQ3 servers allows remote attackers to bypass authentication for relaying by causing a "POP login by user" string that includes the attacker's IP address to be injected into the maillog log file.
EPSS
Процентиль: 87%
0.03549
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other