Vulnerabilities > CVE-2004-2385 - Unspecified vulnerability in Emumail EMU Webmail 5.2.7
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
EMU Webmail 5.2.7 allows remote attackers to obtain sensitive path information (home directory) via an HTTP request for init.emu.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Emumail EMU Webmail 5.2.7 nit.emu Information Disclosure. CVE-2004-2385. Webapps exploit for cgi platform |
id | EDB-ID:23809 |
last seen | 2016-02-02 |
modified | 2004-03-12 |
published | 2004-03-12 |
reporter | dr_insane |
source | https://www.exploit-db.com/download/23809/ |
title | Emumail EMU Webmail 5.2.7 nit.emu Information Disclosure |
Nessus
NASL family | CGI abuses |
NASL id | EMUMAIL_MULTIPLE_VULNS.NASL |
description | According to its version number, the remote host is running a vulnerable version of EMUMAIL WebMail. There are several vulnerabilities in this version, ranging from information disclosure to cross-site scripting vulnerabilities. These issues may allow an attacker to trick a logged-in user into providing access to this system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12095 |
published | 2004-03-14 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12095 |
title | Emumail WebMail Multiple Remote Vulnerabilities (XSS, Disc) |
code |
|
References
- http://members.lycos.co.uk/r34ct/main/emu/emu.txt
- http://members.lycos.co.uk/r34ct/main/emu/emu.txt
- http://secunia.com/advisories/11110
- http://secunia.com/advisories/11110
- http://www.osvdb.org/4203
- http://www.osvdb.org/4203
- http://www.securityfocus.com/bid/9861
- http://www.securityfocus.com/bid/9861
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15453
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15453