Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> General >> IlohaMail Detection


Vulnerability Assessment Details

IlohaMail Detection

Vulnerability Assessment Summary
Searches for the existence of IlohaMail

Detailed Explanation for this Vulnerability Assessment

This script detects whether the remote host is running IlohaMail and
extracts version numbers and locations of any instances found.

IlohaMail is a webmail application that is based on a stock build of
PHP and that does not require either a database or a separate IMAP
library. See for more information.

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2005 George A. Theall

Cables, Connectors

NEW Cisco ASA 5505 ASA5500 V13 Firewall Adaptive Security Appliance #4so
$99.99
NEW Cisco ASA 5505 ASA5500 V13 Firewall Adaptive Security Appliance  #4so pictureUNCLAIMED Cisco Meraki MX64 Cloud-Managed Security Appliance
$0.01
UNCLAIMED Cisco Meraki MX64 Cloud-Managed Security Appliance  picturenetgear prosafe vpn firewall fvs318
$20.0
netgear prosafe vpn firewall fvs318 pictureFortinet FortiWiFi 60E 10 x RJ45, Wireless FWF-60E - under warranty support
$499.99
Fortinet FortiWiFi 60E 10 x RJ45, Wireless FWF-60E - under warranty support picture


Discussions

No Discussions have been posted on this vulnerability.