Apache Pony Mail 0.6c through 0.8b allows remote attackers to bypass authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pony_mail | Apache | 0.6c (including) | 0.6c (including) |
Pony_mail | Apache | 0.7b (including) | 0.7b (including) |
Pony_mail | Apache | 0.8b (including) | 0.8b (including) |