Amax Information Technologies ≫ Magic Winmail Server
6 Schwachstellen gefunden.
- EPSS 7.31%
- Veröffentlicht 25.11.2005 22:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.
CVE-2005-3692
- EPSS 0.79%
- Veröffentlicht 19.11.2005 01:03:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and...
CVE-2005-0313
- EPSS 8.79%
- Veröffentlicht 27.01.2005 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple directory traversal vulnerabilities in Magic Winmail Server 4.0 Build 1112 allow remote attackers to (1) upload arbitrary files via certain parameters to upload.php or (2) read arbitrary files via certain parameters to download.php, and remo...
CVE-2005-0315
- EPSS 0.37%
- Veröffentlicht 27.01.2005 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The FTP service in Magic Winmail Server 4.0 Build 1112 does not verify that the IP address in a PORT command is the same as the IP address of the user of the FTP session, which allows remote authenticated users to use the server as an intermediary fo...
- EPSS 0.67%
- Veröffentlicht 31.12.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
AMAX Magic Winmail Server 3.6 allows remote attackers to obtain sensitive information by entering (1) invalid characters such as "()" or (2) a large number of characters in the Lookup field on the netaddressbook.php web form, which reveals the path i...
CVE-2003-0391
- EPSS 5.55%
- Veröffentlicht 02.07.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Format string vulnerability in Magic WinMail Server 2.3, and possibly other 2.x versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the PASS command.