CVE-2005-1488
https://notcve.org/view.php?id=CVE-2005-1488
Multiple cross-site scripting (XSS) vulnerabilities in Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) the E-mail address, Note, or Public Certificate fields to address.html, (2) addressaction.html, (3) the Signature field to settings.html, or (4) the Shared calendars to calendarsettings.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/20467 •
CVE-2005-1491
https://notcve.org/view.php?id=CVE-2005-1491
Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to (1) move their home directory via viewaction.html or (2) move arbitrary files via the importfile parameter to importaction.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20471 •
CVE-2005-0322
https://notcve.org/view.php?id=CVE-2005-0322
MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 and Mail Server 7.6.4r with Icewarp Mail Server 5.3.2 uses weak encryption in the (1) users.cfg, (2) settings.cfg, (3) users.dat or (4) user.dat files, which allows local users to extract the passwords. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19153 •
CVE-2005-0321
https://notcve.org/view.php?id=CVE-2005-0321
MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 allows remote authenticated users to gain sensitive information via an HTTP request to (1) calendar_d.html, (2) calendar_m.html, (3) calendar_w.html, or (4) calendar_y.html, which reveal the installation path. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19152 •
CVE-2004-1674
https://notcve.org/view.php?id=CVE-2004-1674
viewaction.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to (1) delete arbitrary files via the originalfolder parameter or (2) move arbitrary files via the messageid parameter. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17976 •