5 results (0.014 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

LAN SUITE Web Mail 602Pro allows remote attackers to gain sensitive information via the mail login form, which contains the path to the mail directory. • http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html http://marc.info/?l=bugtraq&m=107799540630302&w=2 http://www.securityfocus.com/bid/9781 https://exchange.xforce.ibmcloud.com/vulnerabilities/15350 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in LAN SUITE Web Mail 602Pro allows remote attackers to execute arbitrary script or HTML as other users via a URL to index.html, followed by a / (slash) and the desired script. NOTE: the vendor states that this bug could not be reproduced, so this issue may be REJECTed in the future. • https://www.exploit-db.com/exploits/23776 http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html http://marc.info/?l=bugtraq&m=107799540630302&w=2 http://www.securityfocus.com/bid/9777 https://exchange.xforce.ibmcloud.com/vulnerabilities/15351 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The Czech edition of Software602's Web Server before 2002.0.02.0916 allows remote attackers to gain administrator privileges via direct HTTP requests to the /admin/ directory, which is not password protected. • http://online.securityfocus.com/archive/1/296119 http://www.iss.net/security_center/static/10408.php http://www.securityfocus.com/bid/6006 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

The Telnet proxy of 602Pro LAN SUITE 2002 does not restrict the number of outstanding connections to the local host, which allows remote attackers to create a denial of service (memory consumption) via a large number of connections. • https://www.exploit-db.com/exploits/21694 http://archives.neohapsis.com/archives/bugtraq/2002-07/0518.html http://www.iss.net/security_center/static/9768.php •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

602Pro LAN SUITE 2002 allows remote attackers to view the directory tree via an HTTP GET request with a trailing "~" (tilde) or ".bak" extension. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0265.html http://www.iss.net/security_center/static/10450.php •