CVE-2009-0350 – Merak Media Player 3.2 - '.m3u' File Local Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2009-0350
Stack-based buffer overflow in Merak Media Player 3.2 allows remote attackers to execute arbitrary code via a long string in a .m3u playlist file, related to the status bar icon's tooltip. NOTE: some of these details are obtained from third party information. Un desbordamiento de pila basado en búfer en Merak Media Player v3.2 permite a atacantes remotos ejecutar codigo de su eleccion a traves de una cadena larga en un fichero de lista de reproduccion .m3u, relacionado con el icono de ayuda de la barra de estado. NOTA: Algunos de estos detalles han sido obtenidos mediante informacion de terceros. • https://www.exploit-db.com/exploits/7857 https://www.exploit-db.com/exploits/8126 http://osvdb.org/51565 http://secunia.com/advisories/33645 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0218 – IceWarp Mail Server 9.1.1 - '/admin/index.html' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2008-0218
Cross-site scripting (XSS) vulnerability in admin/index.html in Merak IceWarp Mail Server allows remote attackers to inject arbitrary web script or HTML via the message parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en admin/index.html de Merak IceWarp Mail Server permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el parámetro message. NOTA: la procedencia de esta información es desconocida; los detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/31001 http://secunia.com/advisories/28460 http://www.securityfocus.com/bid/27189 http://www.securityfocus.com/data/vulnerabilities/exploits/27189.html http://www.vupen.com/english/advisories/2008/0135 https://exchange.xforce.ibmcloud.com/vulnerabilities/39564 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2006-0817
https://notcve.org/view.php?id=CVE-2006-0817
Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556. Vulnerabilidad de salto de directorio absoluto en (a) MERAK Mail Server para Windows 8.3.8r con anteriores IceWarp Web Mail 5.6.1 y (b) VisNetic MailServer anterior a 8.5.0.5 permite a atacantes remotos incluir archivos de su elección a través de una ruta completa de Windows y controlador de cartas en el parámetro (1) language en accounts/inc/include.php y (2) parámetro lang_settings en admin/inc/include.php, lo cual no es desinfectado por la función securepath, un asunto relacionado con CVE-2005-4556. • http://secunia.com/advisories/18953 http://secunia.com/advisories/18966 http://secunia.com/secunia_research/2006-12/advisory http://secunia.com/secunia_research/2006-14/advisory http://securitytracker.com/id?1016513 http://securitytracker.com/id?1016514 http://www.osvdb.org/27328 http://www.securityfocus.com/archive/1/440297/100/0/threaded http://www.securityfocus.com/archive/1/440302/100/0/threaded http://www.securityfocus.com/bid/19002 http://www.securityfocus.com/bid •
CVE-2006-0818
https://notcve.org/view.php?id=CVE-2006-0818
Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558. Vulnerabilidad de salto de directorio de ruta absoluta en (1) MERAK Mail Server para Windows 8.3.8r con anteriores IceWarp Web Mail 5.6.1 y (2) VisNetic MailServer anterior a 8.5.0.5 permite a usuarios remotos validados incluir archivos de su elección a través del parámetro language modificado y un nombre de ruta completo Windows o UNC en el parámetro lang_settings en mail/index.html, lo cual no es saneadoo de forma adecuada por la función PHP validatefolder, posiblemente debido a una solución incompleta para CVE-2005-4558. • http://secunia.com/advisories/18953 http://secunia.com/advisories/18966 http://secunia.com/secunia_research/2006-12/advisory http://secunia.com/secunia_research/2006-14/advisory http://securitytracker.com/id?1016513 http://securitytracker.com/id?1016514 http://www.securityfocus.com/archive/1/440297/100/0/threaded http://www.securityfocus.com/archive/1/440302/100/0/threaded http://www.securityfocus.com/bid/19002 http://www.securityfocus.com/bid/19007 http://www.vupen.com •
CVE-2005-4559 – IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access
https://notcve.org/view.php?id=CVE-2005-4559
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters. • https://www.exploit-db.com/exploits/26984 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securityreason.com/securityalert/299 http://securitytracker.com/id?1015412 http://www.osvdb.org/22082 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https://exchange.xforce.ibmcloud.com/vulnerab •