Apache Pony Mail 0.6c through 0.8b allows remote attackers to bypass authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pony_mail | Apache | 0.8b | 0.8b |
Pony_mail | Apache | 0.6c | 0.6c |
Pony_mail | Apache | 0.7b | 0.7b |