{"id": "EDB-ID:26044", "vendorId": null, "type": "exploitdb", "bulletinFamily": "exploit", "title": "MDaemon 8.0 - Content Filter Directory Traversal", "description": "", "published": "2005-07-27T00:00:00", "modified": "2005-07-27T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.exploit-db.com/exploits/26044", "reporter": "Tan Chew Keong", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2022-08-16T08:44:36", "viewCount": 8, "enchantments": {"score": {"value": 0.2, "vector": "NONE"}, "dependencies": {}, "backreferences": {"references": [{"type": "canvas", "idList": ["MDAEMON"]}]}, "exploitation": null, "vulnersScore": 0.2}, "_state": {"dependencies": 1661190352, "score": 1661184847, "epss": 1678800746}, "_internal": {"score_hash": "aaa3e1ac03847004a765fc2ad434ad38"}, "sourceHref": "https://www.exploit-db.com/download/26044", "sourceData": "source: https://www.securityfocus.com/bid/14400/info\r\n\r\nMDaemon server is prone to a directory traversal vulnerability due to improper sanitization of user input.\r\n\r\nFailure to sanitize the filename and path may result in compromise of the file system outside of the application's quarantine directory. \r\n\r\nThe following email attachment filename example was provided:\r\n\r\n'../../../../../file.exe' ", "osvdbidlist": ["18348"], "exploitType": "remote", "verified": true}
{}