Page 2 of 10 results (0.008 seconds)

CVSS: 5.0EPSS: 2%CPEs: 56EXPL: 3

Directory traversal vulnerability in the HTTP interface in AXIGEN Mail Server 7.4.1 for Windows allows remote attackers to read arbitrary files via a %5C (encoded backslash) in the URL. Vulnerabilidad de salto de directorio en la interfaz HTTP en AXIGEN Mail Server v7.4.1 para Windows permite a atacantes remotos leer archivos a su elección a través de un %5C (barra invertida codificada) en la URL. • https://www.exploit-db.com/exploits/34622 http://packetstormsecurity.org/1009-exploits/axigen741-traversal.txt http://secunia.com/advisories/41430 http://www.acunetix.com/blog/news/directory-traversal-axigen http://www.axigen.com/press/product-releases/axigen-releases-version-742_74.html http://www.osvdb.org/68027 http://www.securityfocus.com/bid/43230 http://www.vupen.com/english/advisories/2010/2415 https://exchange.xforce.ibmcloud.com/vulnerabilities/61826 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the web mail interface feature in AXIGEN Mail Server 6.2.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving e-mail messages. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la función del interfaz de correo web en AXIGEN Mail Server 6.2.2 permite a atacantes remotos inyectar HTML o scripts web arbitrarios a través de vectores sin especificar involucrando mensajes de correo electrónico. NOTA: la procedencia de esta información es desconocida, los detalles son obtenidos exclusivamente de la información de terceros. • http://secunia.com/advisories/34402 http://www.securityfocus.com/bid/34716 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 8%CPEs: 1EXPL: 3

Format string vulnerability in the AXIMilter module in AXIGEN Mail Server 5.0.2 allows remote attackers to execute arbitrary code via format string specifiers in the CNHO command. Vulnerabilidad de cadena de formato en el módulo AXIMilter de AXIGEN Mail Server 5.0.2 permite a atacantes remotos ejecutar código de su elección mediante especificadores de cadena de formato en el comando CNHO. • https://www.exploit-db.com/exploits/4947 http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059788.html http://secunia.com/advisories/28562 http://securityreason.com/securityalert/3570 http://www.securityfocus.com/archive/1/486722/100/0/threaded http://www.securityfocus.com/bid/27363 http://www.vupen.com/english/advisories/2008/0237 https://exchange.xforce.ibmcloud.com/vulnerabilities/39803 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 15%CPEs: 2EXPL: 1

Heap-based buffer underflow in axigen 1.2.6 through 2.0.0b1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via certain base64-encoded data on the pop3 port (110/tcp), which triggers an integer overflow. Desbordamiento de búfer basado en montón en axigen 1.2.6 hasta 2.0.0b1 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) y posiblemente ejecutar código de su elección mediante determinados datos codificados en base64 en el puerto pop3 (110/tcp), lo cual dispara un desbordamiento de entero. • https://www.exploit-db.com/exploits/3289 http://marc.info/?l=full-disclosure&m=117094708423302&w=2 http://osvdb.org/38133 http://secunia.com/advisories/24073 http://www.securityfocus.com/bid/22473 https://exchange.xforce.ibmcloud.com/vulnerabilities/32342 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 1

axigen 1.2.6 through 2.0.0b1 does not properly parse login credentials, which allows remote attackers to cause a denial of service (NULL dereference and application crash) via a base64-encoded "*\x00" sequence on the imap port (143/tcp). axigen 1.2.6 hasta 2.0.0b1 no analiza adecuadamente las credenciales de acceso, lo cual permite a atacantes remotos provocar una denegación de servicio (referencia a NULL y cierre de aplicación) mediante una secuencia en base-64 "*\x00" en el puerto imap (143/tcp). • https://www.exploit-db.com/exploits/3290 http://marc.info/?l=full-disclosure&m=117094708423302&w=2 http://osvdb.org/33165 http://secunia.com/advisories/24073 http://www.securityfocus.com/bid/22473 https://exchange.xforce.ibmcloud.com/vulnerabilities/32345 • CWE-476: NULL Pointer Dereference •