Page 3 of 12 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Calacode @Mail 5.41 on Linux does not require administrative authentication for build-plesk-upgrade.php, which allows remote attackers to obtain sensitive information by creating and downloading a backup archive of the entire @Mail directory tree. NOTE: this can be leveraged for remote exploitation of CVE-2008-3395. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Calacode @Mail 5.41 sobre linux no requiere autenticación de administrador para la página build-plesk-upgrade.php, lo que permite a atacantes remotos obtener información sensible mediante la creación de un archivo de copia de respaldo (backup) de todo el árbol de directorios. NOTA: esto puede ser aprovechado para una explotación remota del CVE-2008-3395. • http://secunia.com/advisories/31279 https://exchange.xforce.ibmcloud.com/vulnerabilities/44145 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Calacode @Mail 5.41 on Linux uses weak world-readable permissions for (1) webmail/libs/Atmail/Config.php and (2) webmail/webadmin/.htpasswd, which allows local users to obtain sensitive information by reading these files. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Calacode @Mail 5.41 en Linux emplea permisos débiles de lectura por todos (world-readable) para webmail/libs/Atmail/Config.php y (2) webmail/webadmin/.htpasswd, lo que permite a usuarios locales obtener información sensible al leer estos ficheros. NOTA: El origen de esta información es desconocido; los detalles se han obtenido únicamente de fuentes de terceros. • http://secunia.com/advisories/31279 http://www.securityfocus.com/bid/30434 https://exchange.xforce.ibmcloud.com/vulnerabilities/44144 • CWE-264: Permissions, Privileges, and Access Controls •