6 results (0.001 seconds)

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

03 Oct 2023 — A deserialization vulnerability in Afterlogic Aurora Files v9.7.3 allows attackers to execute arbitrary code via supplying a crafted .sabredav file. Una vulnerabilidad de deserialización en Afterlogic Aurora Files v9.7.3 permite a los atacantes ejecutar código arbitrario proporcionando un archivo .sabredav manipulado. • http://afterlogic.com • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 87%CPEs: 2EXPL: 2

07 Mar 2021 — An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password). Se detectó un problema en AfterLogic Aurora versiones hasta 7.7.9 y WebMail Pro versiones hasta 7.7.9. Permiten saltar directorio para leer archivos (t... • https://github.com/dorkerdevil/CVE-2021-26294 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 50%CPEs: 2EXPL: 1

04 Mar 2021 — An issue was discovered in AfterLogic Aurora through 8.5.3 and WebMail Pro through 8.5.3, when DAV is enabled. They allow directory traversal to create new files (such as an executable file under the web root). This is related to DAVServer.php in 8.x and DAV/Server.php in 7.x. Se detectó un problema en AfterLogic Aurora versiones hasta 8.5.3 y WebMail Pro versiones hasta 8.5.3, cuando DAV está habilitado. Permiten saltar directorios para crear nuevos archivos (como un archivo ejecutable en la root web)... • https://auroramail.wordpress.com/2021/02/03/addressing-dav-related-vulnerability-in-webmail-and-aurora • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

26 Nov 2019 — Afterlogic WebMail Pro 8.3.11, and WebMail in Afterlogic Aurora 8.3.11, allows Remote Stored XSS via an attachment name. Afterlogic WebMail Pro versión 8.3.11, y WebMail en Afterlogic Aurora versión 8.3.11, permite un ataque de tipo XSS almacenado remoto por medio de un nombre de archivo adjunto. • https://afterlogic.com • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

12 Sep 2019 — Afterlogic Aurora through 8.3.9-build-a3 has XSS that can be leveraged for session hijacking by retrieving the session cookie from the administrator login. Afterlogic Aurora versiones hasta 8.3.9-build-a3, presenta una vulnerabilidad de tipo XSS que puede ser aprovechada para el secuestro de sesión mediante la recuperación de la cookie de sesión desde el inicio de sesión del administrador. • https://www.sevenlayers.com/index.php/247-afterlogic-aurora-v8-3-9-build-a3-xss-session-hijack • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 1

19 Sep 2017 — AdminPanel in AfterLogic WebMail 7.7 and Aurora 7.7.5 has XSS via the txtDomainName field to adminpanel/modules/pro/inc/ajax.php during addition of a domain. Existe una vulnerabilidad de Cross-Site Scripting (XSS) en AdminPanel en AfterLogic WebMail 7.7 y Aurora 7.7.5 mediante el campo txtDomainName a adminpanel/modules/pro/inc/ajax.php al añadir un dominio. • https://auroramail.wordpress.com/2017/08/28/vulnerability-in-webmailaurora-closed • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •