Neosys

Neon Webmail

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.2%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Neon WebMail for Java before 5.08 allows remote attackers to execute arbitrary Java (JSP) code by sending an e-mail message with a JSP file attachment, which is stored under the web root with a predictable filename.

Exploit
  • EPSS 11.06%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The updatemail servlet in Neon WebMail for Java before 5.08 allows remote attackers to move e-mail messages of arbitrary users between different mail folders, specified by the folderid and tofolderid parameters, via the ID parameter.

Exploit
  • EPSS 0.72%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple SQL injection vulnerabilities in Neon WebMail for Java before 5.08 allow remote attackers to execute arbitrary SQL commands via the (1) adr_sortkey and (2) adr_sortkey_desc parameters in the (a) addrlist servlet, and the (3) sortkey and (4) ...

Exploit
  • EPSS 8.66%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The updateuser servlet in Neon WebMail for Java before 5.08 does not validate the in_id parameter, which allows remote attackers to modify information of arbitrary users, as demonstrated by modifying (1) passwords and (2) permissions, (3) viewing pro...

Exploit
  • EPSS 9.61%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in the downloadfile servlet in Neon WebMail for Java before 5.08 allows remote attackers to read arbitrary files via a .. (dot dot) sequence in the (1) savefolder and (2) savefilename parameters.

Exploit
  • EPSS 1.22%
  • Veröffentlicht 23.09.2006 10:07:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Cross-site scripting (XSS) vulnerability in the updateuser servlet in Neon WebMail for Java before 5.08 allows remote attackers to inject arbitrary web script or HTML via the in_name parameter, as used by the Name field.