
CVE-2005-4556 – IceWarp Universal WebMail - '/accounts/inc/include.php' Multiple Remote File Inclusions
https://notcve.org/view.php?id=CVE-2005-4556
28 Dec 2005 — PHP remote file include vulnerability in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, when register_globals is enabled, allows remote attackers to include arbitrary local and remote PHP files via a URL in the (1) lang_settings and (2) language parameters in (a) accounts/inc/include.php and (b) admin/inc/include.php. • https://www.exploit-db.com/exploits/26979 •

CVE-2005-4557 – IceWarp Universal WebMail - '/dir/include.html?lang' Local File Inclusion
https://notcve.org/view.php?id=CVE-2005-4557
28 Dec 2005 — dir/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, allows remote attackers to include arbitrary local files via a null byte (%00) in the lang parameter, possibly due to a directory traversal vulnerability. • https://www.exploit-db.com/exploits/26981 •

CVE-2005-4558 – IceWarp Universal WebMail - '/mail/index.html?lang_settings' Remote File Inclusion
https://notcve.org/view.php?id=CVE-2005-4558
28 Dec 2005 — IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly restrict acceptable values for the language parameter to mail/settings.html before it is stored in a database, which can allow remote authenticated users to include arbitrary PHP code via a URL in a modified lang_settings parameter to mail/index.html. • https://www.exploit-db.com/exploits/26983 •

CVE-2005-4559 – IceWarp Universal WebMail - '/mail/include.html' Crafted HTTP_USER_AGENT Arbitrary File Access
https://notcve.org/view.php?id=CVE-2005-4559
28 Dec 2005 — mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters. • https://www.exploit-db.com/exploits/26984 •