Page 3 of 25 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2, when the mailbox.dat file does not exist, allows remote authenticated users to determine if a file exists via the folder parameter to attachment.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20472 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to obtain the full path of the server via certain requests to (1) calendar_addevent.html, (2) calendar_event.html, or (3) calendar_task.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20469 •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) the E-mail address, Note, or Public Certificate fields to address.html, (2) addressaction.html, (3) the Signature field to settings.html, or (4) the Shared calendars to calendarsettings.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/20467 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to (1) move their home directory via viewaction.html or (2) move arbitrary files via the importfile parameter to importaction.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20471 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 and Mail Server 7.6.4r with Icewarp Mail Server 5.3.2 uses weak encryption in the (1) users.cfg, (2) settings.cfg, (3) users.dat or (4) user.dat files, which allows local users to extract the passwords. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19153 •