VYPR

V Webmail

by V Webmail

CVEs (8)

  • CVE-2006-2666May 30, 2006
    risk 0.04cvss epss 0.15

    PHP remote file inclusion vulnerability in includes/mailaccess/pop3.php in V-Webmail 1.5 through 1.6.4 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.

  • CVE-2006-2665May 30, 2006
    risk 0.04cvss epss 0.10

    PHP remote file inclusion vulnerability in includes/mailaccess/pop3/core.php in V-Webmail 1.3 allows remote attackers to execute arbitrary PHP code via a URL in the CONFIG[pear_dir] parameter.

  • CVE-2006-0792Feb 19, 2006
    risk 0.03cvss epss 0.01

    Cross-site scripting (XSS) vulnerability in preferences.personal.php in V-webmail 1.6.2 allows remote attackers to inject arbitrary web script or HTML via the newid parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

  • CVE-2008-3061Oct 8, 2008
    risk 0.00cvss epss 0.00

    Open redirect vulnerability in redirect.php in V-webmail 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the to parameter.

  • CVE-2008-3063Oct 8, 2008
    risk 0.00cvss epss 0.00

    SQL injection vulnerability in login.php in V-webmail 1.5.0 might allow remote attackers to execute arbitrary SQL commands via the username parameter.

  • CVE-2008-3060Oct 8, 2008
    risk 0.00cvss epss 0.00

    V-webmail 1.5.0 allows remote attackers to obtain sensitive information via (1) malformed input in the login page (includes/local.hooks.php) and (2) an invalid session ID, which reveals the installation path in an error message.

  • CVE-2006-0794Feb 19, 2006
    risk 0.00cvss epss 0.00

    help.php in V-webmail 1.6.2 allows remote attackers to obtain the installation path via unspecified invalid parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

  • CVE-2006-0793Feb 19, 2006
    risk 0.00cvss epss 0.01

    frameset.php in V-webmail 1.6.2 allows remote attackers to conduct phishing attacks by referencing arbitrary websites in the rframe parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.