Page 4 of 38 results (0.005 seconds)

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Early termination vulnerability in the IMAP service in E-Post Mail 4.05 and SPA-PRO Mail 4.05 allows remote attackers to cause a denial of service (infinite loop) by sending an APPEND command and disconnecting before the expected amount of data is sent. Vulnerabilidad de termianción temprana en el servicio IMAP de E-Post MAIL 4.05 Y SPA-PRO Mail 4.05 permite a atacantes remotos causar una denegación de servicio (bucle infinito) enviando una orden APPEND y desconectando antes de que la cantidad de datos esperada sea enviada. • http://secunia.com/advisories/18480 http://secunia.com/secunia_research/2006-1/advisory http://www.osvdb.org/22766 http://www.securityfocus.com/bid/16379 http://www.vupen.com/english/advisories/2006/0318 https://exchange.xforce.ibmcloud.com/vulnerabilities/24341 •

CVSS: 5.0EPSS: 7%CPEs: 3EXPL: 1

mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters. • https://www.exploit-db.com/exploits/26984 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securityreason.com/securityalert/299 http://securitytracker.com/id?1015412 http://www.osvdb.org/22082 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https://exchange.xforce.ibmcloud.com/vulnerab •

CVSS: 6.5EPSS: 11%CPEs: 3EXPL: 5

IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html. • https://www.exploit-db.com/exploits/26983 https://www.exploit-db.com/exploits/26982 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22080 http://www.osvdb.org/22081 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https:&# •

CVSS: 7.5EPSS: 11%CPEs: 3EXPL: 5

PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php. • https://www.exploit-db.com/exploits/26979 https://www.exploit-db.com/exploits/26980 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22077 http://www.osvdb.org/22078 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 4

dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability. • https://www.exploit-db.com/exploits/26981 http://marc.info/?l=full-disclosure&m=113570229524828&w=2 http://secunia.com/advisories/17046 http://secunia.com/advisories/17865 http://secunia.com/secunia_research/2005-62/advisory http://securitytracker.com/id?1015412 http://www.osvdb.org/22079 http://www.securityfocus.com/archive/1/420255/100/0/threaded http://www.securityfocus.com/bid/16069 https://exchange.xforce.ibmcloud.com/vulnerabilities/23897 •