Page 7 of 42 results (0.011 seconds)

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Merak Mail Server 8.0.3 with Icewarp Web Mail 5.4.2 allows remote authenticated users to (1) move their home directory via viewaction.html or (2) move arbitrary files via the importfile parameter to importaction.html. • http://marc.info/?l=bugtraq&m=111530933016434&w=2 http://secunia.com/advisories/15249 https://exchange.xforce.ibmcloud.com/vulnerabilities/20471 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 and Mail Server 7.6.4r with Icewarp Mail Server 5.3.2 uses weak encryption in the (1) users.cfg, (2) settings.cfg, (3) users.dat or (4) user.dat files, which allows local users to extract the passwords. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19153 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

MERAK Mail Server 7.6.0 with Icewarp Web Mail 5.3.0 allows remote authenticated users to gain sensitive information via an HTTP request to (1) calendar_d.html, (2) calendar_m.html, (3) calendar_w.html, or (4) calendar_y.html, which reveal the installation path. • http://marc.info/?l=bugtraq&m=110693950205007&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/19152 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

INweb Mail Server 2.40 allows remote attackers to cause a denial of service (crash) via a large number of connect/disconnect actions to the (1) POP3 and (2) SMTP services. • http://members.lycos.co.uk/r34ct/main/inwebmail.txt http://secunia.com/advisories/12056 http://securitytracker.com/id?1010680 http://www.osvdb.org/7770 http://www.securityfocus.com/bid/10719 https://exchange.xforce.ibmcloud.com/vulnerabilities/16683 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

viewaction.html in Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to (1) delete arbitrary files via the originalfolder parameter or (2) move arbitrary files via the messageid parameter. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17976 •