Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-21913 | An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure. |
Tue, 14 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-14T17:52:53.266Z
Reserved: 2020-12-04T00:00:00.000Z
Link: CVE-2020-29547
Updated: 2024-08-04T16:55:10.308Z
Status : Modified
Published: 2023-05-29T19:15:09.413
Modified: 2025-01-14T18:15:21.907
Link: CVE-2020-29547
No data.
OpenCVE Enrichment
No data.
EUVD