Page 5 of 25 results (0.014 seconds)

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 7

Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message. • https://www.exploit-db.com/exploits/24377 https://www.exploit-db.com/exploits/24379 https://www.exploit-db.com/exploits/24378 https://www.exploit-db.com/exploits/24380 http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9037 http://www.osvdb.org/9038 http://www.osvdb.org/9039 http://www.osvdb.org/9040 http: •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The (1) function.php or (2) function.view.php scripts in Merak Mail Server 5.2.7 allow remote attackers to read arbitrary PHP files via a direct HTTP request to port 32000. • http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9045 http://www.securityfocus.com/bid/10966 https://exchange.xforce.ibmcloud.com/vulnerabilities/17029 •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 5

The (1) address.html and possibly (2) calendar.html pages in Merak Mail Server 5.2.7 allow remote attackers to gain sensitive information via an invalid HTTP request, which reveals the installation path. NOTE: it is unclear whether the calendar.html is an exposure, since the path is leaked in web logs that may only be available to the administrators, who would have access to the path through legitimate means. • https://www.exploit-db.com/exploits/24381 http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9043 http://www.securityfocus.com/bid/10966 https://exchange.xforce.ibmcloud.com/vulnerabilities/17027 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 5

SQL injection vulnerability in calendar.html in Merak Mail Server 5.2.7 allows remote attackers to execute arbitrary SQL statements via the schedule parameter. • https://www.exploit-db.com/exploits/24382 http://marc.info/?l=bugtraq&m=109279057326044&w=2 http://packetstormsecurity.nl/0408-exploits/merak527.txt http://secunia.com/advisories/12269 http://securitytracker.com/id?1010969 http://www.osvdb.org/9044 http://www.securityfocus.com/bid/10966 https://exchange.xforce.ibmcloud.com/vulnerabilities/17022 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Merak Mail IceWarp Web Mail uses a static identifier as a user session ID that does not change across sessions, which could allow remote attackers with access to the ID to gain privileges as that user, e.g. by extracting the ID from the user's answer or forward URLs. Merak Mail IceWarp Web Mail usa un identificador estático como ID de sesión de usuario que no cambia con las sesiones, lo que podría permitir a atacantes remotos con acceso a la ID que obtengan los privilegios de ese usuario, por ejemplo obteniendo la ID de la respuesta del usuario o URLs enviadas. • http://marc.info/?l=bugtraq&m=101328887821909&w=2 •