Vulnerabilities > Hastymail

DATE CVE VULNERABILITY TITLE RISK
2011-11-30 CVE-2011-4542 SQL Injection vulnerability in Hastymail Hastymail2
Hastymail2 2.1.1 before RC2 allows remote attackers to execute arbitrary commands via the (1) rs or (2) rsargs[] parameter in a mailbox Drafts action to the default URI.
network
low complexity
hastymail CWE-89
7.5
2011-11-29 CVE-2011-4541 Cross-Site Scripting vulnerability in Hastymail Hastymail2
Cross-site scripting (XSS) vulnerability in index.php in Hastymail2 2.1.1 before RC2 allows remote attackers to inject arbitrary web script or HTML via the rs parameter in a mailbox Drafts action.
network
hastymail CWE-79
4.3
2011-01-18 CVE-2010-4646 Cross-Site Scripting vulnerability in Hastymail Hastymail2
Cross-site scripting (XSS) vulnerability in Hastymail2 before 1.01 allows remote attackers to inject arbitrary web script or HTML via a crafted background attribute within a cell in a TABLE element, related to improper use of the htmLawed filter.
network
hastymail CWE-79
4.3
2011-01-18 CVE-2009-5051 Configuration vulnerability in Hastymail Hastymail2
Hastymail2 before RC 8 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
network
low complexity
hastymail CWE-16
5.0
2006-10-17 CVE-2006-5313 Improper Input Validation vulnerability in Hastymail
Hastymail 1.5 and earlier before 20061008 allows remote authenticated users to send arbitrary SMTP commands by placing them after a CRLF.CRLF sequence in the smtp_message parameter.
network
low complexity
hastymail CWE-20
6.5
2006-10-12 CVE-2006-5262 Unspecified vulnerability in Hastymail
CRLF injection vulnerability in lib/session.php in Hastymail 1.5 and earlier before 20061008 allows remote authenticated users to send arbitrary IMAP commands via a CRLF sequence in a mailbox name.
network
low complexity
hastymail
6.5
2004-12-31 CVE-2004-2704 Cross-Site Scripting vulnerability in multiple products
Hastymail 1.0.1 and earlier (stable) and 1.1 and earlier (development) does not send the "attachment" parameter in the Content-Disposition field for attachments, which causes the attachment to be rendered inline by Internet Explorer when the victim clicks the download link, which facilitates cross-site scripting (XSS) and possibly other attacks.
4.3