Page 2 of 13 results (0.012 seconds)

CVSS: 6.8EPSS: 14%CPEs: 21EXPL: 2

03 Jun 2004 — Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mime.php de SquirrelMail anteriores a 1.4.3 permite a atacantes remotos insertar HTML y script de su elección mediante la cabecera de correo Content-Type, como se ha demostrado usando read_body.php. • https://www.exploit-db.com/exploits/24160 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

31 Dec 2002 — openwebmail.pl in Open WebMail 1.7 and 1.71 reveals sensitive information in error messages and generates different responses whether a user exists or not, which allows remote attackers to identify valid usernames via brute force attacks and obtain certain configuration and version information. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0278.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

26 Dec 2002 — openwebmail_init in Open WebMail 1.81 and earlier allows local users to execute arbitrary code via .. (dot dot) sequences in a login name, such as the name provided in the sessionid parameter for openwebmail-abook.pl, which is used to find a configuration file that specifies additional code to be executed. openwebmail_init en Open WebMail 1.81 y anteriores permiten a usuarios locales ejecutar código arbitrario mediante secuencias .. (punto punto) en un nombre de inicio de sesión, como el nombre suministrado... • http://marc.info/?l=bugtraq&m=104031696120743&w=2 •