Page 2 of 16 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Telnet proxy in 602 Lan Suite 2004.0.04.0909 and earlier allows remote attackers to cause a denial of service (socket exhaustion) via a Telnet request to an IP address of the proxy's network interface, which causes a loop. • http://marc.info/?l=bugtraq&m=109976745017459&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/17979 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The webmail service in 602 Lan Suite 2004.0.04.0909 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) by sending a POST request with a large Content-Length value, then disconnecting without sending that amount of data. • http://marc.info/?l=bugtraq&m=109976745017459&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/17977 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

LAN SUITE Web Mail 602Pro allows remote attackers to gain sensitive information via the mail login form, which contains the path to the mail directory. • http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html http://marc.info/?l=bugtraq&m=107799540630302&w=2 http://www.securityfocus.com/bid/9781 https://exchange.xforce.ibmcloud.com/vulnerabilities/15350 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 2

Cross-site scripting (XSS) vulnerability in LAN SUITE Web Mail 602Pro allows remote attackers to execute arbitrary script or HTML as other users via a URL to index.html, followed by a / (slash) and the desired script. NOTE: the vendor states that this bug could not be reproduced, so this issue may be REJECTed in the future. • https://www.exploit-db.com/exploits/23776 http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html http://marc.info/?l=bugtraq&m=107799540630302&w=2 http://www.securityfocus.com/bid/9777 https://exchange.xforce.ibmcloud.com/vulnerabilities/15351 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

LAN SUITE Web Mail 602Pro, when configured to use the "Directory browsing" feature, allows remote attackers to obtain a directory listing via an HTTP request to (1) index.html, (2) cgi-bin/, or (3) users/. • http://archives.neohapsis.com/archives/bugtraq/2004-03/0096.html http://marc.info/?l=bugtraq&m=107799540630302&w=2 http://www.securityfocus.com/bid/9780 https://exchange.xforce.ibmcloud.com/vulnerabilities/15349 •