Page 4 of 30 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 26EXPL: 0

Unspecified vulnerability in Atmail before 6.6.4, and 7.x before 7.1.2, has unknown impact and attack vectors, a different vulnerability than CVE-2013-5031, CVE-2013-5032, and CVE-2013-5034. Vulnerabilidad no especificada en Atmail anteriores a 6.6.4, y 7.x anteriores a 7.1.2, tienen un impacto y vectores de ataque no especificados, una vulnerabilidad diferente a CVE-2013-5031, CVE-2013-5032, y CVE-2013-5034. • http://atmail.com/changelog http://blog.atmail.com/2013/atmail-7-1-2-security-hotfix •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

Cross-site scripting (XSS) vulnerability in Atmail Webmail Server 6.6.x before 6.6.3 and 7.0.x before 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<MessageID>/filenameOriginal/. Vulnerabilidad de XSS en Atmail Webmail Server 6.6.x anterior a 6.6.3 y 7.0.x anterior a 7.0.3 permite a atacantes remotos inyectar script Web o HTML arbitrarios a través de PATH_INFO hacia index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<MessageID>/filenameOriginal/. Atmail WebMail versions 7.0.2 and below suffer from a reflective cross site scripting vulnerability. • http://www.isecauditors.com/advisories-2013#2013-004 http://www.securityfocus.com/archive/1/530934/100/0/threaded https://atmail.com/changelog • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

@Mail WebMail Client in AtMail Open-Source 1.04 and earlier allows remote attackers to obtain configuration information via a direct request to install/info.php, which calls the phpinfo function. @Mail WebMail Client en AtMail Open-Source v1.04 y anteriores permite a atacantes remotos obtener información de configuración a través de una solicitud directa a install/info.php, lo cual llama a la función phpinfo. • http://en.securitylab.ru/lab/PT-2011-48 http://secunia.com/advisories/47012 http://www.kb.cert.org/vuls/id/743555 https://exchange.xforce.ibmcloud.com/vulnerabilities/74282 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

compose.php in @Mail WebMail Client in AtMail Open-Source before 1.05 does not properly handle ../ (dot dot slash) sequences in the unique parameter, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ..././ (dot dot dot slash dot slash) sequence. compose.php en @Mail WebMail Client en AtMail Open-Source antes de v1.05 no gestiona correctamente las secuencias ../ (punto punto barra) en el parámetro 'unique', lo que permite realizar ataques de salto de directorio y leer archivos de su elección a atacantes remotos a través de una secuencia ..././ (punto punto punto punto barra barra). • http://atmail.org/download/atmailopen.tgz http://en.securitylab.ru/lab/PT-2011-48 http://secunia.com/advisories/47012 http://www.kb.cert.org/vuls/id/743555 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Multiple directory traversal vulnerabilities in (1) compose.php and (2) libs/Atmail/SendMsg.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allow remote attackers to read arbitrary files via a .. (dot dot) in the Attachment[] parameter. Múltiples vulnerabilidades de salto de directorio en (1) compose.php y (2) libs/Atmail/SendMsg.php in @Mail WebMail Client en AtMail Open-Source antes de v1.05 permiten a atacantes remotos leer ficheros de su elección a través de un .. (punto punto) en el parámetro Attachment[]. • http://atmail.org/download/atmailopen.tgz http://en.securitylab.ru/lab/PT-2011-48 http://secunia.com/advisories/47012 http://www.kb.cert.org/vuls/id/743555 https://exchange.xforce.ibmcloud.com/vulnerabilities/74504 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •