CVE-2018-1779219.07.2019, 17:15MDaemon Webmail (formerly WorldClient) has CSRF.CSRFEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST8.8 HIGHNETWORKLOWNONECVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HmitreCNA------CVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 42%VendorProductVersionaltnmdaemon_webmail14.0𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-352 - Cross-Site Request Forgery (CSRF)The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Referenceshttp://packetstormsecurity.com/files/153686/WorldClient-14-Cross-Site-Request-Forgery.htmlhttps://packetstormsecurity.com/files/cve/CVE-2018-17792https://www.altn.com/Software/MDaemon-Webmail-WorldClient/http://packetstormsecurity.com/files/153686/WorldClient-14-Cross-Site-Request-Forgery.htmlhttps://packetstormsecurity.com/files/cve/CVE-2018-17792https://www.altn.com/Software/MDaemon-Webmail-WorldClient/