3 results (0.023 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. El módulo useredit_account.wdm en Alt-N WebAdmin 3.2.5 que funciona con MDaemon 9.0.6, y posiblemente versiones anteriores, permite a un administrador de dominio remoto validado conseguir privilegios y obtener acceso a la cola del sistema de correo a través de la modificación de la bandeja de entrada de la cuenta de usuario de MDaemon para usar la bandeja de entrada de otra cuenta de usuario. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://secunia.com/advisories/21727 http://securityreason.com/securityalert/1516 http://www.osvdb.org/28548 http://www.securityfocus.com/archive/1/445153/100/0/threaded http://www.teklow.com/advisories/TTG0602.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/28776 •

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated domain administrators to change a global administrator's password and gain privileges via the userlist.wdm file. Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anteriores, permite a administradores de dominio autenticados remotamente cambiar la contraseña de un administrador global y escalar privilegios mediante el archivo userlist.wdm. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048959.html http://secunia.com/advisories/21558 http://securityreason.com/securityalert/1455 http://www.securityfocus.com/archive/1/444012/100/0/threaded http://www.securityfocus.com/bid/19631 http://www.vupen.com/english/advisories/2006/3333 https://exchange.xforce.ibmcloud.com/vulnerabilities/28489 •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

Multiple directory traversal vulnerabilities in Alt-N WebAdmin 3.2.3 and 3.2.4 running with MDaemon 9.0.5, and possibly earlier, allow remote authenticated global administrators to read arbitrary files via a .. (dot dot) in the file parameter to (1) logfile_view.wdm and (2) configfile_view.wdm. Múltiples vulnerabilidades de escalada de directorio en Alt-N WebAdmin 3.2.3 y 3.2.4 ejecutándose con MDaemon 9.0.5, y posiblemente anterioes, permite a administradores globales autenticados remotamente leer archivos de su elección mediante un .. (punto punto) en el parámetro file de (1) logfile_view.wdm y (2) configfile_view.wdm. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-August/048959.html http://secunia.com/advisories/21558 http://securityreason.com/securityalert/1455 http://www.osvdb.org/28122 http://www.osvdb.org/28123 http://www.securityfocus.com/archive/1/444012/100/0/threaded http://www.securityfocus.com/bid/19620 http://www.vupen.com/english/advisories/2006/3333 https://exchange.xforce.ibmcloud.com/vulnerabilities/28488 •