Page 4 of 19 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 1

Cross-site scripting (XSS) vulnerability in Atmail Webmail Server 6.6.x before 6.6.3 and 7.0.x before 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<MessageID>/filenameOriginal/. Vulnerabilidad de XSS en Atmail Webmail Server 6.6.x anterior a 6.6.3 y 7.0.x anterior a 7.0.3 permite a atacantes remotos inyectar script Web o HTML arbitrarios a través de PATH_INFO hacia index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<MessageID>/filenameOriginal/. Atmail WebMail versions 7.0.2 and below suffer from a reflective cross site scripting vulnerability. • http://www.isecauditors.com/advisories-2013#2013-004 http://www.securityfocus.com/archive/1/530934/100/0/threaded https://atmail.com/changelog • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Calacode @Mail 5.41 on Linux does not require administrative authentication for build-plesk-upgrade.php, which allows remote attackers to obtain sensitive information by creating and downloading a backup archive of the entire @Mail directory tree. NOTE: this can be leveraged for remote exploitation of CVE-2008-3395. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Calacode @Mail 5.41 sobre linux no requiere autenticación de administrador para la página build-plesk-upgrade.php, lo que permite a atacantes remotos obtener información sensible mediante la creación de un archivo de copia de respaldo (backup) de todo el árbol de directorios. NOTA: esto puede ser aprovechado para una explotación remota del CVE-2008-3395. • http://secunia.com/advisories/31279 https://exchange.xforce.ibmcloud.com/vulnerabilities/44145 • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Calacode @Mail 5.41 on Linux uses weak world-readable permissions for (1) webmail/libs/Atmail/Config.php and (2) webmail/webadmin/.htpasswd, which allows local users to obtain sensitive information by reading these files. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Calacode @Mail 5.41 en Linux emplea permisos débiles de lectura por todos (world-readable) para webmail/libs/Atmail/Config.php y (2) webmail/webadmin/.htpasswd, lo que permite a usuarios locales obtener información sensible al leer estos ficheros. NOTA: El origen de esta información es desconocido; los detalles se han obtenido únicamente de fuentes de terceros. • http://secunia.com/advisories/31279 http://www.securityfocus.com/bid/30434 https://exchange.xforce.ibmcloud.com/vulnerabilities/44144 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in compose.pl in @Mail 4.3 and earlier for Windows allows remote attackers to upload arbitrary files to arbitrary locations via a .. (dot dot) in the unique parameter. Vulnerabilidad de salto de directorio en compose.pl en @Mail 4.3 y en versiones anteriores para Windows permite a atacantes remotos subir archivos arbitrarios en ubicaciones arbitrarias a través de .. (punto punto) en el parámetro unique. • http://kb.atmail.com/view_article.php?num=374 http://secunia.com/advisories/18646 http://www.osvdb.org/22882 http://www.securityfocus.com/bid/16470 http://www.vupen.com/english/advisories/2006/0415 https://exchange.xforce.ibmcloud.com/vulnerabilities/24459 •