Description
Macallan Mail Solution 2.8.4.6 (Build 260), and possibly earlier versions, allows remote attackers to bypass authentication in the web interface via an HTTP GET request with two slashes ("//") after the server name.
Exploits (1)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1009030
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/3926
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15194
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/10861
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/9646
Third Party Advisory x_refsource_misc
https://testzone.secunia.com/advisories/10861
Scores
EPSS
0.0494
EPSS Percentile
89.7%
Details
Status
published
Products (1)
macallan/mail_solution
2.8.4.6_build_260
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026