CVE-2005-1490
https://notcve.org/view.php?id=CVE-2005-1490
Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2, when the mailbox.dat file does not exist, allows remote authenticated users to determine if a file exists via the folder parameter to attachment.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20472 •
CVE-2005-1489
https://notcve.org/view.php?id=CVE-2005-1489
Unknown vulnerability in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to obtain the full path of the server via certain requests to (1) calendar_addevent.html, (2) calendar_event.html, or (3) calendar_task.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20469 •
CVE-2005-1488
https://notcve.org/view.php?id=CVE-2005-1488
Multiple cross-site scripting (XSS) vulnerabilities in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) the E-mail address, Note, or Public Certificate fields to address.html, (2) addressaction.html, (3) the Signature field to settings.html, or (4) the Shared calendars to calendarsettings.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/20467 •
CVE-2005-1491
https://notcve.org/view.php?id=CVE-2005-1491
Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to (1) move their home directory via viewaction.html or (2) move arbitrary files via the importfile parameter to importaction.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20471 •
CVE-2005-0322
https://notcve.org/view.php?id=CVE-2005-0322
MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 and Mail Server 7.6.4r with Icewarp Mail Server 5.3.2 uses weak encryption in the (1) users.cfg, (2) settings.cfg, (3) users.dat or (4) user.dat files, which allows local users to extract the passwords. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19153 •