Vulnerability Name: | CVE-2001-0104 (CCN-5763) | ||||||||
Assigned: | 2000-12-14 | ||||||||
Published: | 2000-12-14 | ||||||||
Updated: | 2017-12-19 | ||||||||
Summary: | MDaemon Pro 3.5.1 and earlier allows local users to bypass the "lock server" security setting by pressing the Cancel button at the password prompt, then pressing the enter key. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Thu Dec 14 2000 - 10:39:33 CST Bypass MDaemon 3.5.1 "Lock Server" Protection Source: MITRE Type: CNA CVE-2001-0104 Source: CCN Type: Alt-N Technologies Web site Mdaemon Source: CCN Type: OSVDB ID: 12040 MDaemon Pro lock server Security Bypass Source: BUGTRAQ Type: UNKNOWN 20001214 Bypass MDaemon 3.5.1 "Lock Server" Protection Source: BID Type: Vendor Advisory 2115 Source: CCN Type: BID-2115 Alt-N MDaemon Lock Server Bypass Vulnerabiltiy Source: XF Type: UNKNOWN mdaemon-lock-bypass-password(5763) Source: XF Type: UNKNOWN mdaemon-lock-bypass-password(5763) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |