Page 2 of 24 results (0.002 seconds)

CVSS: 7.5EPSS: 11%CPEs: 3EXPL: 5

PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php. • https://www.exploit-db.com/exploits/26979 https://www.exploit-db.com/exploits/26980 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22077 http://www.osvdb.org/22078 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 •

CVSS: 5.0EPSS: 7%CPEs: 3EXPL: 1

mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters. • https://www.exploit-db.com/exploits/26984 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securityreason.com/securityalert/299 http://securitytracker.com/id?1015412 http://www.osvdb.org/22082 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https://exchange.xforce.ibmcloud.com/vulnerab •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 2

Multiple directory traversal vulnerabilities in MERAK Mail Server 8.2.4r with Icewarp Web Mail 5.5.1, and possibly earlier versions, allows remote attackers to (1) delete arbitrary files or directories via a relative path to the id parameter to logout.html or (2) include arbitrary PHP files or other files via the helpid parameter to help.html. • https://www.exploit-db.com/exploits/26313 http://marc.info/?l=bugtraq&m=112810385104168&w=2 http://secunia.com/advisories/17046 http://www.securityfocus.com/bid/14986 http://www.securityfocus.com/bid/14988 http://www.vupen.com/english/advisories/2005/1933 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 6

Multiple cross-site scripting (XSS) vulnerabilities in MERAK Mail Server 8.2.4r with Icewarp Web Mail 5.5.1, and possibly earlier versions, allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to blank.html, or the createdataCX parameter to (2) calendar_d.html, (3) calendar_m.html, or (4) calendar_w.html. • https://www.exploit-db.com/exploits/26308 https://www.exploit-db.com/exploits/26309 https://www.exploit-db.com/exploits/26310 https://www.exploit-db.com/exploits/26311 http://marc.info/?l=bugtraq&m=112810385104168&w=2 http://secunia.com/advisories/17046 http://www.securityfocus.com/bid/14980 http://www.vupen.com/english/advisories/2005/1933 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

MERAK Mail Server 8.2.4r with Icewarp Web Mail 5.5.1, and possibly earlier versions, allows remote attackers to obtain sensitive information via a direct request to bwlist_inc.html, which reveals the path in an error message. • http://marc.info/?l=bugtraq&m=112810385104168&w=2 http://secunia.com/advisories/17046 http://www.vupen.com/english/advisories/2005/1933 •