Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-27183

An issue was discovered in MDaemon before 20.0.4. Administrators can use Remote Administration to exploit an Arbitrary File Write vulnerability. An attacker is able to create new files in any location of the filesystem, or he may be able to modify existing files. This vulnerability may directly lead to Remote Code Execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.044
EPSS Ranking 88.4%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2021-27183
  • Altn » Mdaemon » Version: 12.5.4
    cpe:2.3:a:altn:mdaemon:12.5.4
  • Altn » Mdaemon » Version: 14.0.0
    cpe:2.3:a:altn:mdaemon:14.0.0
  • Altn » Mdaemon » Version: 14.0.1
    cpe:2.3:a:altn:mdaemon:14.0.1
  • Altn » Mdaemon » Version: 14.0.2
    cpe:2.3:a:altn:mdaemon:14.0.2
  • Altn » Mdaemon » Version: 14.0.3
    cpe:2.3:a:altn:mdaemon:14.0.3
  • Altn » Mdaemon » Version: 14.5.0
    cpe:2.3:a:altn:mdaemon:14.5.0
  • Altn » Mdaemon » Version: 14.5.3
    cpe:2.3:a:altn:mdaemon:14.5.3
  • Altn » Mdaemon » Version: 15.0.0
    cpe:2.3:a:altn:mdaemon:15.0.0
  • Altn » Mdaemon » Version: 15.0.1
    cpe:2.3:a:altn:mdaemon:15.0.1
  • Altn » Mdaemon » Version: 15.0.2
    cpe:2.3:a:altn:mdaemon:15.0.2
  • Altn » Mdaemon » Version: 15.0.3
    cpe:2.3:a:altn:mdaemon:15.0.3
  • Altn » Mdaemon » Version: 15.5.0
    cpe:2.3:a:altn:mdaemon:15.5.0
  • Altn » Mdaemon » Version: 15.5.1
    cpe:2.3:a:altn:mdaemon:15.5.1
  • Altn » Mdaemon » Version: 15.5.2
    cpe:2.3:a:altn:mdaemon:15.5.2
  • Altn » Mdaemon » Version: 15.5.3
    cpe:2.3:a:altn:mdaemon:15.5.3
  • Altn » Mdaemon » Version: 16.0.0
    cpe:2.3:a:altn:mdaemon:16.0.0
  • Altn » Mdaemon » Version: 16.0.1
    cpe:2.3:a:altn:mdaemon:16.0.1
  • Altn » Mdaemon » Version: 16.0.2
    cpe:2.3:a:altn:mdaemon:16.0.2
  • Altn » Mdaemon » Version: 16.0.3
    cpe:2.3:a:altn:mdaemon:16.0.3
  • Altn » Mdaemon » Version: 16.0.4
    cpe:2.3:a:altn:mdaemon:16.0.4
  • Altn » Mdaemon » Version: 16.5.1
    cpe:2.3:a:altn:mdaemon:16.5.1
  • Altn » Mdaemon » Version: 16.5.2
    cpe:2.3:a:altn:mdaemon:16.5.2
  • Altn » Mdaemon » Version: 17.0.0
    cpe:2.3:a:altn:mdaemon:17.0.0
  • Altn » Mdaemon » Version: 17.0.1
    cpe:2.3:a:altn:mdaemon:17.0.1
  • Altn » Mdaemon » Version: 17.0.2
    cpe:2.3:a:altn:mdaemon:17.0.2
  • Altn » Mdaemon » Version: 17.5.0
    cpe:2.3:a:altn:mdaemon:17.5.0
  • Altn » Mdaemon » Version: 17.5.1
    cpe:2.3:a:altn:mdaemon:17.5.1
  • Altn » Mdaemon » Version: 17.5.3
    cpe:2.3:a:altn:mdaemon:17.5.3
  • Altn » Mdaemon » Version: 18.0.0
    cpe:2.3:a:altn:mdaemon:18.0.0
  • Altn » Mdaemon » Version: 18.0.1
    cpe:2.3:a:altn:mdaemon:18.0.1
  • Altn » Mdaemon » Version: 18.0.2
    cpe:2.3:a:altn:mdaemon:18.0.2
  • Altn » Mdaemon » Version: 18.5.0
    cpe:2.3:a:altn:mdaemon:18.5.0
  • Altn » Mdaemon » Version: 18.5.1
    cpe:2.3:a:altn:mdaemon:18.5.1
  • Altn » Mdaemon » Version: 18.5.2
    cpe:2.3:a:altn:mdaemon:18.5.2
  • Altn » Mdaemon » Version: 18.5.3
    cpe:2.3:a:altn:mdaemon:18.5.3
  • Altn » Mdaemon » Version: 9.6.4
    cpe:2.3:a:altn:mdaemon:9.6.4
  • Altn » Mdaemon » Version: 9.6.5
    cpe:2.3:a:altn:mdaemon:9.6.5


Contact Us

Shodan ® - All rights reserved