Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2005-3431
Disclosure Date: November 02, 2005 (last updated February 22, 2025)
Absolute path traversal vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to read arbitrary files via a full pathname in the AttachPath field of a mail message under composition.
0
Attacker Value
Unknown
CVE-2005-3429
Disclosure Date: November 02, 2005 (last updated February 22, 2025)
Rockliffe MailSite Express before 6.1.22, with the option to save login information enabled, saves user passwords in plaintext in cookies, which allows local users to obtain passwords by reading the cookie file, or remote attackers to obtain the cookies via cross-site scripting (XSS) vulnerabilities.
0
Attacker Value
Unknown
CVE-2005-3428
Disclosure Date: November 02, 2005 (last updated February 22, 2025)
Cross-site scripting (XSS) vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to inject arbitrary web script or HTML via a message body.
0
Attacker Value
Unknown
CVE-2005-3430
Disclosure Date: November 02, 2005 (last updated February 22, 2025)
Incomplete blacklist vulnerability in Rockliffe MailSite Express before 6.1.22 allows remote attackers to upload and execute arbitrary script files by giving the files specific extensions, such as (1) .unk, (2) .asa, and possibly (3) .htr and (4) .aspx, which are not filtered like the .asp extension.
0
Attacker Value
Unknown
CVE-2005-3287
Disclosure Date: October 23, 2005 (last updated February 22, 2025)
Incomplete blacklist vulnerability in Mailsite Express allows remote attackers to upload and possibly execute files via attachments with executable extensions such as ASPX, which are not converted to .TXT like other dangerous extensions, and which can be directly requested from the cache directory.
0
Attacker Value
Unknown
CVE-2005-3288
Disclosure Date: October 23, 2005 (last updated February 22, 2025)
Mailsite Express allows remote attackers to upload and execute files with executable extensions such as ASP by attaching the file using the "compose page" feature, then accessing the file from the cache directory before saving or sending the message.
0