Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-61084

EPSS 0.06% · P17
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-61084

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle brackets (<>) in the From: header of SMTP DATA. An attacker can craft a From: header with multiple invisible Unicode thin spaces to display a spoofed sender while passing validation, allowing email spoofing even when anti-spoofing protections are in place. NOTE: this is disputed by the Supplier because UI spoofing occurs in a client, not in a server such as MDaemon's product or any other server implementation. Also, if a client without its own spoofing protection must be used, the Header Screening feature in MDaemon's product can be employed to mitigate the client-side vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MDaemon Mail Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MDaemon Mail Server是美国MDaemon公司的一个电子邮件服务器软件。 MDaemon Mail Server 23.5.2版本存在安全漏洞,该漏洞源于使用SMTP DATA中From标头的尖括号内电子邮件验证SPF、DKIM和DMARC时存在缺陷,可能导致电子邮件欺骗攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-61084

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-61084

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-11-05 · 20 CVEs total

CVE-2025-571308.3 HIGHZwiiCMS 安全漏洞
CVE-2025-127455.3 MEDIUMQuickJS quickjs.c js_array_buffer_slice buffer over-read
CVE-2025-56231Tonec Internet Download Manager 安全漏洞
CVE-2025-60784XiaozhangBang Voluntary Like System 安全漏洞
CVE-2025-63334PocketVJ CP 安全漏洞
CVE-2025-63585Open Source Social Network 安全漏洞
CVE-2025-63417SelfBest 安全漏洞
CVE-2025-63418SelfBest 安全漏洞
CVE-2025-55343Ecuador Quipux 安全漏洞
CVE-2025-55342Ecuador Quipux 安全漏洞
CVE-2025-55341Ecuador Quipux 安全漏洞
CVE-2025-63416SelfBest 安全漏洞
CVE-2025-56232GOG Galaxy 安全漏洞
CVE-2025-63248DWSurvey 安全漏洞
CVE-2025-57244OpenKM Community Edition 安全漏洞
CVE-2025-59716guests 安全漏洞
CVE-2025-61304Dynatrace ActiveGate 安全漏洞
CVE-2025-63601Snipe-IT 安全漏洞
CVE-2025-60753libarchive 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2025-61084

No comments yet


Leave a comment