Atmail : Security Vulnerabilities, CVEs, Published In 2012
@Mail WebMail Client in AtMail Open-Source 1.04 and earlier allows remote attackers to obtain configuration information via a direct request to install/info.php, which calls the phpinfo function.
Max CVSS
5.0
EPSS Score
0.38%
Published
2012-03-27
Updated
2017-12-13
CRLF injection vulnerability in mime.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to conduct directory traversal attacks and read arbitrary files via a %0A sequence followed by a .. (dot dot) in the file parameter.
Max CVSS
6.4
EPSS Score
0.46%
Published
2012-03-27
Updated
2012-08-29
Multiple directory traversal vulnerabilities in (1) compose.php and (2) libs/Atmail/SendMsg.php in @Mail WebMail Client in AtMail Open-Source before 1.05 allow remote attackers to read arbitrary files via a .. (dot dot) in the Attachment[] parameter.
Max CVSS
5.0
EPSS Score
1.25%
Published
2012-03-27
Updated
2017-12-13
compose.php in @Mail WebMail Client in AtMail Open-Source before 1.05 does not properly handle ../ (dot dot slash) sequences in the unique parameter, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ..././ (dot dot dot slash dot slash) sequence.
Max CVSS
5.0
EPSS Score
0.40%
Published
2012-03-27
Updated
2012-08-29
@Mail WebMail Client in AtMail Open-Source before 1.05 allows remote attackers to execute arbitrary code via an e-mail attachment with an executable extension, leading to the creation of an executable file under tmp/.
Max CVSS
7.5
EPSS Score
4.43%
Published
2012-03-27
Updated
2012-08-29
5 vulnerabilities found