2 results (0.004 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. El módulo useredit_account.wdm en Alt-N WebAdmin 3.2.5 que funciona con MDaemon 9.0.6, y posiblemente versiones anteriores, permite a un administrador de dominio remoto validado conseguir privilegios y obtener acceso a la cola del sistema de correo a través de la modificación de la bandeja de entrada de la cuenta de usuario de MDaemon para usar la bandeja de entrada de otra cuenta de usuario. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://secunia.com/advisories/21727 http://securityreason.com/securityalert/1516 http://www.osvdb.org/28548 http://www.securityfocus.com/archive/1/445153/100/0/threaded http://www.teklow.com/advisories/TTG0602.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/28776 •

CVSS: 3.5EPSS: 0%CPEs: 4EXPL: 2

Absolute path traversal vulnerability in Alt-N Technologies WebAdmin 2.0.0 through 2.0.2 allows remote attackers with administrator privileges to (1) determine the installation path by reading the contents of the Name parameter in a link, and (2) read arbitrary files via an absolute path in the Name parameter. • https://www.exploit-db.com/exploits/22542 https://www.exploit-db.com/exploits/22541 http://securityreason.com/securityalert/3286 http://www.securityfocus.com/archive/1/319735 http://www.securityfocus.com/bid/7438 http://www.securityfocus.com/bid/7439 https://exchange.xforce.ibmcloud.com/vulnerabilities/11874 https://exchange.xforce.ibmcloud.com/vulnerabilities/11875 • CWE-20: Improper Input Validation •