
CVE-2009-1469 – IceWarp Merak Mail Server 9.4.1 - 'Forgot Password' Input Validation
https://notcve.org/view.php?id=CVE-2009-1469
05 May 2009 — CRLF injection vulnerability in the Forgot Password implementation in server/webmail.php in IceWarp eMail Server and WebMail Server before 9.4.2 makes it easier for remote attackers to trick a user into disclosing credentials via CRLF sequences preceding a Reply-To header in the subject element of an XML document, as demonstrated by triggering an e-mail message from the server that contains a user's correct credentials, and requests that the user compose a reply that includes this message. Vulnerabilidad de... • https://www.exploit-db.com/exploits/32986 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2009-1516 – Icewarp Merak Mail Server 9.4.1 - 'Base64FileEncode()' Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2009-1516
04 May 2009 — Stack-based buffer overflow in the IceWarpServer.APIObject ActiveX control in api.dll in IceWarp Merak Mail Server 9.4.1 might allow context-dependent attackers to execute arbitrary code via a large value in the second argument to the Base64FileEncode method, as possibly demonstrated by a web application that accepts untrusted input for this method. Desbordamiento de búfer en el control ActiveX en IceWarpServer.APIObject en api.dll en IceWarp Merak Mail Server v9.4.1, permite a atacantes, dependiendo del co... • https://www.exploit-db.com/exploits/8542 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2008-5734
https://notcve.org/view.php?id=CVE-2008-5734
26 Dec 2008 — Cross-site scripting (XSS) vulnerability in WebMail Pro in IceWarp Software Merak Mail Server 9.3.2 allows remote attackers to inject arbitrary web script or HTML via an IMG element in an HTML e-mail message. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en WebMail Pro en IceWarp Software Merak Mail Server 9.3.2 permite a atacantes remotos inyectar secuencias de comandos web de su elección o HTML mediante un elementos IMG en un mensaje e-mail en formato HTML. • http://blog.vijatov.com/index.php?itemid=11 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2007-5046
https://notcve.org/view.php?id=CVE-2007-5046
24 Sep 2007 — Cross-site scripting (XSS) vulnerability in the Webmail interface for IceWarp Merak Mail Server before 9.0.0 allows remote attackers to inject arbitrary JavaScript via a javascript: URI in an attribute of an element in an email message body, as demonstrated by the onload attribute in a BODY element. Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en la interfaz Webmail para ceWarp Merak Mail Server anterior a 9.0.0 permite a atacantes remotos inyectar JavaScript de su elección a través de u... • http://osvdb.org/37428 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2006-0817
https://notcve.org/view.php?id=CVE-2006-0817
18 Jul 2006 — Absolute path directory traversal vulnerability in (a) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (b) VisNetic MailServer before 8.5.0.5 allows remote attackers to include arbitrary files via a full Windows path and drive letter in the (1) language parameter in accounts/inc/include.php and (2) lang_settings parameter in admin/inc/include.php, which is not properly sanitized by the securepath function, a related issue to CVE-2005-4556. Vulnerabilidad de salto de directorio ab... • http://secunia.com/advisories/18953 •

CVE-2006-0818
https://notcve.org/view.php?id=CVE-2006-0818
18 Jul 2006 — Absolute path directory traversal vulnerability in (1) MERAK Mail Server for Windows 8.3.8r with before IceWarp Web Mail 5.6.1 and (2) VisNetic MailServer before 8.5.0.5 allows remote authenticated users to include arbitrary files via a modified language parameter and a full Windows or UNC pathname in the lang_settings parameter to mail/index.html, which is not properly sanitized by the validatefolder PHP function, possibly due to an incomplete fix for CVE-2005-4558. Vulnerabilidad de salto de directorio de... • http://secunia.com/advisories/18953 •

CVE-2005-4556 – IceWarp Universal WebMail - '/accounts/inc/include.php' Multiple Remote File Inclusions
https://notcve.org/view.php?id=CVE-2005-4556
28 Dec 2005 — PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php. • https://www.exploit-db.com/exploits/26979 •

CVE-2005-4557 – IceWarp Universal WebMail - '/dir/include.html?lang' Local File Inclusion
https://notcve.org/view.php?id=CVE-2005-4557
28 Dec 2005 — dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability. • https://www.exploit-db.com/exploits/26981 •

CVE-2005-4558 – IceWarp Universal WebMail - '/mail/index.html?lang_settings' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2005-4558
28 Dec 2005 — IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html. • https://www.exploit-db.com/exploits/26983 •

CVE-2005-4559 – IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access
https://notcve.org/view.php?id=CVE-2005-4559
28 Dec 2005 — mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters. • https://www.exploit-db.com/exploits/26984 •