Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57012
Categoría:CGI abuses
Título:IceWarp Web Mail < 5.3.0 Multiple Vulnerabilities
Resumen:NOSUMMARY
Descripción:Description:

The remote version of IceWarp, according to its version
number, is vulnerable to multiple attacks. Attackers may
be able to move/delete folders, perform cross-site
scripting attacks, gain access to sensitive data, and more.

Versions prior to 5.3.0 are vulnerable.

Solution : Upgrade to 5.3.0 or later.

Risk factor : High

CVSS Score:
7.5

Referencia Cruzada: BugTraq ID: 11371
Common Vulnerability Exposure (CVE) ID: CVE-2004-1669
http://www.securityfocus.com/bid/11371
Bugtraq: 20040910 Multiple vulnerabilities in Icewarp Web Mail 5.2.7 (Google Search)
http://marc.info/?l=bugtraq&m=109483971420067&w=2
http://secunia.com/advisories/12789
XForce ISS Database: merak-icewarp-xss(17313)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17313
Common Vulnerability Exposure (CVE) ID: CVE-2004-1670
XForce ISS Database: merak-icewarp-create-directory(17314)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17314
Common Vulnerability Exposure (CVE) ID: CVE-2004-1671
XForce ISS Database: merak-icewarp-path-disclosure(17315)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17315
Common Vulnerability Exposure (CVE) ID: CVE-2004-1672
XForce ISS Database: merak-icewarp-view-attachment(17316)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17316
Common Vulnerability Exposure (CVE) ID: CVE-2004-1673
XForce ISS Database: merak-icewarp-create-file(17317)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17317
Common Vulnerability Exposure (CVE) ID: CVE-2004-1674
XForce ISS Database: merak-icewarp-file-deletion(17976)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17976
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.