|
Description
|
|
Multiple vulnerabilities were identified in V-webmail, which could be exploited by malicious users to conduct cross site scripting attacks or disclose sensitive information.
The first is due to an input validation error in the "preferences.personal.php" script that does not properly validate the "newid" variable, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to an input validation error in the "help.php" script that does not properly handle invalid parameters, which could be exploited by attackers to determine the installation path.
The third vulnerability is due to an input validation error in the "frameset.php" script that does not properly validate the "rframe" parameter, which could be exploited by malicious people to conduct spoofing and phishing attacks.
|