3 results (0.002 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

The useredit_account.wdm module in Alt-N WebAdmin 3.2.5 running with MDaemon 9.0.6, and possibly earlier versions, allows remote authenticated domain administrators to gain privileges and obtain access to the system mail queue by modifying the mailbox of the MDaemon user account to use the mailbox of another account. El módulo useredit_account.wdm en Alt-N WebAdmin 3.2.5 que funciona con MDaemon 9.0.6, y posiblemente versiones anteriores, permite a un administrador de dominio remoto validado conseguir privilegios y obtener acceso a la cola del sistema de correo a través de la modificación de la bandeja de entrada de la cuenta de usuario de MDaemon para usar la bandeja de entrada de otra cuenta de usuario. • http://files.altn.com/WebAdmin/Release/RelNotes_en.txt http://secunia.com/advisories/21727 http://securityreason.com/securityalert/1516 http://www.osvdb.org/28548 http://www.securityfocus.com/archive/1/445153/100/0/threaded http://www.teklow.com/advisories/TTG0602.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/28776 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in useredit_account.wdm in Alt-N WebAdmin 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the user parameter. • http://marc.info/?l=bugtraq&m=110692897003614&w=2 http://secunia.com/advisories/14079 http://securitytracker.com/id?1013038 http://www.securityfocus.com/bid/12395 https://exchange.xforce.ibmcloud.com/vulnerabilities/19161 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

useredit_account.wdm in Alt-N WebAdmin 3.0.4 does not properly validate account edits by the logged in user, which allows remote authenticated users to edit other users' account information via a modified user parameter. • http://marc.info/?l=bugtraq&m=110692897003614&w=2 http://securitytracker.com/id?1013038 http://www.securityfocus.com/bid/12395 •