Page 8 of 38 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Cross-site scripting (XSS) vulnerability in MERAK Mail Server 7.4.5 with Icewarp Web Mail 5.2.7 and possibly other versions allows remote attackers to execute arbitrary web script or HTML via the (1) User name parameter to accountsettings.html or (2) Search string parameter to search.html. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17313 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Multiple directory traversal vulnerabilities Merak Mail Server 7.4.5 with Icewarp Web Mail 5.2.7, and possibly other versions, allow remote attackers to (1) create arbitrary directories via a .. (dot dot) in the user parameter to viewaction.html or (2) rename arbitrary files via a ....// (doubled dot dot) in the folderold or folder parameters to folders.html. • http://marc.info/?l=bugtraq&m=109483971420067&w=2 http://secunia.com/advisories/12789 http://www.securityfocus.com/bid/11371 https://exchange.xforce.ibmcloud.com/vulnerabilities/17314 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Merak Mail IceWarp Web Mail uses a static identifier as a user session ID that does not change across sessions, which could allow remote attackers with access to the ID to gain privileges as that user, e.g. by extracting the ID from the user's answer or forward URLs. Merak Mail IceWarp Web Mail usa un identificador estático como ID de sesión de usuario que no cambia con las sesiones, lo que podría permitir a atacantes remotos con acceso a la ID que obtengan los privilegios de ese usuario, por ejemplo obteniendo la ID de la respuesta del usuario o URLs enviadas. • http://marc.info/?l=bugtraq&m=101328887821909&w=2 •