Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2002-1782
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
24.2%
CVSS Severity
CVSS v2 Score
2.1
References
http://online.securityfocus.com/archive/1/275127
http://www.security.nnov.ru/advisories/courier.asp
http://www.securityfocus.com/bid/4909
http://www.washington.edu/imap/IMAP-FAQs/index.html#5.1
https://exchange.xforce.ibmcloud.com/vulnerabilities/9238
http://online.securityfocus.com/archive/1/275127
http://www.security.nnov.ru/advisories/courier.asp
http://www.securityfocus.com/bid/4909
http://www.washington.edu/imap/IMAP-FAQs/index.html#5.1
https://exchange.xforce.ibmcloud.com/vulnerabilities/9238
Products affected by CVE-2002-1782
University Of Washington
»
Uw-Imap
»
Version:
2001.0a
cpe:2.3:a:university_of_washington:uw-imap:2001.0a
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved