Detailed analysis of security vulnerabilities
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.