Total vulnerabilities in the database
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.
CVSS v2:
No CWE or OWASP classifications available.