NOCC Webmail 1.0 allows remote attackers to obtain the installation path via a direct request to html/header.php.
Max CVSS
5.0
EPSS Score
0.74%
Published
2006-02-25
Updated
2008-09-05
NOCC Webmail 1.0 allows remote attackers to obtain sensitive information via a direct request to (1) the profiles directory, which leaks e-mail addresses contained in filenames of profiles, and (2) the tmp directory, which lists names of uploaded attachments.
Max CVSS
5.0
EPSS Score
0.56%
Published
2006-02-25
Updated
2008-09-05
NOCC Webmail 1.0 stores e-mail attachments in temporary files with predictable filenames, which makes it easier for remote attackers to execute arbitrary code by accessing the e-mail attachment via directory traversal vulnerabilities.
Max CVSS
7.5
EPSS Score
3.31%
Published
2006-02-25
Updated
2008-09-05
Multiple directory traversal vulnerabilities in NOCC Webmail 1.0 allow remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing NULL (%00) byte in (1) the _SESSION['nocc_theme'] parameter in (a) html/footer.php; and (2) the lang and (3) theme parameters and the (4) Accept-Language HTTP header field, when force_default_lang is disabled, in (b) index.php, as demonstrated by injecting PHP code into a profile and accessing it using the lang parameter in index.php.
Max CVSS
5.0
EPSS Score
6.36%
Published
2006-02-25
Updated
2017-07-20
4 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!