Page 3 of 15 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

viewaction.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to (1) delete arbitrary files via the originalfolder parameter or (2) move arbitrary files via the messageid parameter. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17976 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Cross-site scripting (XSS) vulnerability in MERAK Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to execute arbitrary web script or HTML via the (1) User name parameter to accountsettings.html or (2) Search string parameter to search.html. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17313 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Multiple directory traversal vulnerabilities Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7, and possibly other versions, allow remote attackers to (1) create arbitrary directories via a .. (dot dot) in the user parameter to viewaction.html or (2) rename arbitrary files via a ....// (doubled dot dot) in the folderold or folder parameters to folders.html. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17314 •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 7

Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message. • https://www.exploit-db.com/exploits/24377 https://www.exploit-db.com/exploits/24379 https://www.exploit-db.com/exploits/24378 https://www.exploit-db.com/exploits/24380 http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9037 http://www.osvdb.org/9038 http://www.osvdb.org/9039 http://www.osvdb.org/9040 http: •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 5

The (1) address.html and possibly (2) calendar.html pages in Merak Mail Server 5.2.7 allow remote attackers to gain sensitive information via an invalid HTTP request, which reveals the installation path. NOTE: it is unclear whether the calendar.html is an exposure, since the path is leaked in web logs that may only be available to the administrators, who would have access to the path through legitimate means. • https://www.exploit-db.com/exploits/24381 http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9043 http://www.securityfocus.com/bid/10966 https://exchange.xforce.ibmcloud.com/vulnerabilities/17027 •