Lucene search

K
Amax Information TechnologiesMagic Winmail Server

6 matches found

CVE
CVE
added 2005/11/25 10:3 p.m.45 views

CVE-2005-3811

Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.

5CVSS6.6AI score0.07312EPSS
CVE
CVE
added 2003/07/02 4:0 a.m.41 views

CVE-2003-0391

Format string vulnerability in Magic WinMail Server 2.3, and possibly other 2.x versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the PASS command.

7.5CVSS7.8AI score0.05551EPSS
CVE
CVE
added 2005/02/10 5:0 a.m.41 views

CVE-2005-0313

Multiple directory traversal vulnerabilities in Magic Winmail Server 4.0 Build 1112 allow remote attackers to (1) upload arbitrary files via certain parameters to upload.php or (2) read arbitrary files via certain parameters to download.php, and remote authenticated users to read, create, or delete...

7.5CVSS7.2AI score0.10034EPSS
CVE
CVE
added 2005/11/19 1:3 a.m.41 views

CVE-2005-3692

Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments.

4.3CVSS5.7AI score0.0066EPSS
CVE
CVE
added 2005/11/22 2:0 a.m.35 views

CVE-2004-2572

AMAX Magic Winmail Server 3.6 allows remote attackers to obtain sensitive information by entering (1) invalid characters such as "()" or (2) a large number of characters in the Lookup field on the netaddressbook.php web form, which reveals the path in an ldaplib.php error message when the ldap_sear...

5CVSS6.6AI score0.00674EPSS
CVE
CVE
added 2005/02/10 5:0 a.m.34 views

CVE-2005-0315

The FTP service in Magic Winmail Server 4.0 Build 1112 does not verify that the IP address in a PORT command is the same as the IP address of the user of the FTP session, which allows remote authenticated users to use the server as an intermediary for port scanning.

4.6CVSS6.8AI score0.00365EPSS