V-webmail

V-webmail

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 08.10.2008 00:09:07
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Open redirect vulnerability in redirect.php in V-webmail 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the to parameter.

  • EPSS 0.29%
  • Veröffentlicht 08.10.2008 00:00:04
  • Zuletzt bearbeitet 09.04.2025 00:30:58

V-webmail 1.5.0 allows remote attackers to obtain sensitive information via (1) malformed input in the login page (includes/local.hooks.php) and (2) an invalid session ID, which reveals the installation path in an error message.

  • EPSS 0.33%
  • Veröffentlicht 08.10.2008 00:00:04
  • Zuletzt bearbeitet 09.04.2025 00:30:58

SQL injection vulnerability in login.php in V-webmail 1.5.0 might allow remote attackers to execute arbitrary SQL commands via the username parameter.

Exploit
  • EPSS 10.35%
  • Veröffentlicht 30.05.2006 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PHP remote file inclusion vulnerability in includes/mailaccess/pop3/core.php in V-Webmail 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.

Exploit
  • EPSS 15.15%
  • Veröffentlicht 30.05.2006 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PHP remote file inclusion vulnerability in includes/mailaccess/pop3.php in V-Webmail 1.5 through 1.6.4 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.

Exploit
  • EPSS 0.51%
  • Veröffentlicht 19.02.2006 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cross-site scripting (XSS) vulnerability in preferences.personal.php in V-webmail 1.6.2 allows remote attackers to inject arbitrary web script or HTML via the newid parameter. NOTE: the provenance of this information is unknown; the details are obta...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 19.02.2006 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

frameset.php in V-webmail 1.6.2 allows remote attackers to conduct phishing attacks by referencing arbitrary websites in the rframe parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party info...

  • EPSS 0.36%
  • Veröffentlicht 19.02.2006 21:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

help.php in V-webmail 1.6.2 allows remote attackers to obtain the installation path via unspecified invalid parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.